2011-10-04 18:03:20 -04:00
|
|
|
/***************************************************************************
|
|
|
|
* _ _ ____ _
|
|
|
|
* Project ___| | | | _ \| |
|
|
|
|
* / __| | | | |_) | |
|
|
|
|
* | (__| |_| | _ <| |___
|
|
|
|
* \___|\___/|_| \_\_____|
|
|
|
|
*
|
2019-01-29 04:09:29 -05:00
|
|
|
* Copyright (C) 1998 - 2019, Daniel Stenberg, <daniel@haxx.se>, et al.
|
2011-10-04 18:03:20 -04:00
|
|
|
*
|
|
|
|
* This software is licensed as described in the file COPYING, which
|
|
|
|
* you should have received as part of this distribution. The terms
|
2016-02-02 18:19:02 -05:00
|
|
|
* are also available at https://curl.haxx.se/docs/copyright.html.
|
2011-10-04 18:03:20 -04:00
|
|
|
*
|
|
|
|
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
|
|
|
* copies of the Software, and permit persons to whom the Software is
|
|
|
|
* furnished to do so, under the terms of the COPYING file.
|
|
|
|
*
|
|
|
|
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
|
|
|
* KIND, either express or implied.
|
|
|
|
*
|
|
|
|
***************************************************************************/
|
2012-04-06 17:35:15 -04:00
|
|
|
#include "tool_setup.h"
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
#ifdef HAVE_FCNTL_H
|
|
|
|
# include <fcntl.h>
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef HAVE_LOCALE_H
|
|
|
|
# include <locale.h>
|
|
|
|
#endif
|
|
|
|
|
2013-07-29 10:03:46 -04:00
|
|
|
#ifdef __VMS
|
|
|
|
# include <fabdef.h>
|
|
|
|
#endif
|
|
|
|
|
2019-03-10 12:13:40 -04:00
|
|
|
#ifdef __AMIGA__
|
|
|
|
# include <proto/dos.h>
|
|
|
|
#endif
|
|
|
|
|
2016-09-30 12:54:02 -04:00
|
|
|
#include "strcase.h"
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
#define ENABLE_CURLX_PRINTF
|
|
|
|
/* use our own printf() functions */
|
|
|
|
#include "curlx.h"
|
|
|
|
|
|
|
|
#include "tool_binmode.h"
|
|
|
|
#include "tool_cfgable.h"
|
|
|
|
#include "tool_cb_dbg.h"
|
|
|
|
#include "tool_cb_hdr.h"
|
|
|
|
#include "tool_cb_prg.h"
|
|
|
|
#include "tool_cb_rea.h"
|
|
|
|
#include "tool_cb_see.h"
|
|
|
|
#include "tool_cb_wrt.h"
|
|
|
|
#include "tool_dirhie.h"
|
2011-10-04 19:19:58 -04:00
|
|
|
#include "tool_doswin.h"
|
2011-10-04 18:03:20 -04:00
|
|
|
#include "tool_easysrc.h"
|
2018-02-05 15:57:39 -05:00
|
|
|
#include "tool_filetime.h"
|
2011-10-04 18:03:20 -04:00
|
|
|
#include "tool_getparam.h"
|
|
|
|
#include "tool_helpers.h"
|
2011-10-06 11:39:00 -04:00
|
|
|
#include "tool_homedir.h"
|
2011-10-04 18:03:20 -04:00
|
|
|
#include "tool_libinfo.h"
|
|
|
|
#include "tool_main.h"
|
2012-06-08 08:21:29 -04:00
|
|
|
#include "tool_metalink.h"
|
2011-10-04 18:03:20 -04:00
|
|
|
#include "tool_msgs.h"
|
|
|
|
#include "tool_operate.h"
|
|
|
|
#include "tool_operhlp.h"
|
2013-08-27 11:39:16 -04:00
|
|
|
#include "tool_paramhlp.h"
|
2011-10-04 18:03:20 -04:00
|
|
|
#include "tool_parsecfg.h"
|
|
|
|
#include "tool_setopt.h"
|
|
|
|
#include "tool_sleep.h"
|
2011-10-05 14:16:16 -04:00
|
|
|
#include "tool_urlglob.h"
|
2011-10-06 11:39:00 -04:00
|
|
|
#include "tool_util.h"
|
|
|
|
#include "tool_writeout.h"
|
|
|
|
#include "tool_xattr.h"
|
2013-02-05 22:51:55 -05:00
|
|
|
#include "tool_vms.h"
|
2014-02-22 11:04:30 -05:00
|
|
|
#include "tool_help.h"
|
2014-02-23 05:37:44 -05:00
|
|
|
#include "tool_hugehelp.h"
|
2011-10-04 18:03:20 -04:00
|
|
|
|
2013-01-03 20:50:28 -05:00
|
|
|
#include "memdebug.h" /* keep this as LAST include */
|
2011-10-04 18:03:20 -04:00
|
|
|
|
2013-08-10 16:55:59 -04:00
|
|
|
#ifdef CURLDEBUG
|
|
|
|
/* libcurl's debug builds provide an extra function */
|
|
|
|
CURLcode curl_easy_perform_ev(CURL *easy);
|
|
|
|
#endif
|
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
#define CURLseparator "--_curl_--"
|
|
|
|
|
|
|
|
#ifndef O_BINARY
|
|
|
|
/* since O_BINARY as used in bitmasks, setting it to zero makes it usable in
|
|
|
|
source code but yet it doesn't ruin anything */
|
|
|
|
# define O_BINARY 0
|
|
|
|
#endif
|
|
|
|
|
2017-08-22 03:07:11 -04:00
|
|
|
#define CURL_CA_CERT_ERRORMSG \
|
|
|
|
"More details here: https://curl.haxx.se/docs/sslcerts.html\n\n" \
|
|
|
|
"curl failed to verify the legitimacy of the server and therefore " \
|
|
|
|
"could not\nestablish a secure connection to it. To learn more about " \
|
|
|
|
"this situation and\nhow to fix it, please visit the web page mentioned " \
|
|
|
|
"above.\n"
|
2011-10-04 18:03:20 -04:00
|
|
|
|
2014-02-22 13:57:02 -05:00
|
|
|
static bool is_fatal_error(CURLcode code)
|
2012-02-07 16:06:03 -05:00
|
|
|
{
|
|
|
|
switch(code) {
|
|
|
|
case CURLE_FAILED_INIT:
|
|
|
|
case CURLE_OUT_OF_MEMORY:
|
|
|
|
case CURLE_UNKNOWN_OPTION:
|
|
|
|
case CURLE_FUNCTION_NOT_FOUND:
|
|
|
|
case CURLE_BAD_FUNCTION_ARGUMENT:
|
|
|
|
/* critical error */
|
2014-02-22 13:57:02 -05:00
|
|
|
return TRUE;
|
2012-02-07 16:06:03 -05:00
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
2014-02-22 13:57:02 -05:00
|
|
|
|
2012-02-07 16:06:03 -05:00
|
|
|
/* no error or not critical */
|
2014-02-22 13:57:02 -05:00
|
|
|
return FALSE;
|
2012-02-07 16:06:03 -05:00
|
|
|
}
|
|
|
|
|
2018-02-19 08:31:06 -05:00
|
|
|
/*
|
|
|
|
* Check if a given string is a PKCS#11 URI
|
|
|
|
*/
|
|
|
|
static bool is_pkcs11_uri(const char *string)
|
|
|
|
{
|
|
|
|
if(curl_strnequal(string, "pkcs11:", 7)) {
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-07-22 16:15:27 -04:00
|
|
|
#ifdef __VMS
|
|
|
|
/*
|
|
|
|
* get_vms_file_size does what it takes to get the real size of the file
|
|
|
|
*
|
|
|
|
* For fixed files, find out the size of the EOF block and adjust.
|
|
|
|
*
|
|
|
|
* For all others, have to read the entire file in, discarding the contents.
|
|
|
|
* Most posted text files will be small, and binary files like zlib archives
|
|
|
|
* and CD/DVD images should be either a STREAM_LF format or a fixed format.
|
|
|
|
*
|
|
|
|
*/
|
2016-11-23 01:53:24 -05:00
|
|
|
static curl_off_t vms_realfilesize(const char *name,
|
|
|
|
const struct_stat *stat_buf)
|
2013-07-22 16:15:27 -04:00
|
|
|
{
|
|
|
|
char buffer[8192];
|
|
|
|
curl_off_t count;
|
|
|
|
int ret_stat;
|
|
|
|
FILE * file;
|
|
|
|
|
2016-04-19 02:42:55 -04:00
|
|
|
/* !checksrc! disable FOPENMODE 1 */
|
2015-06-02 02:28:10 -04:00
|
|
|
file = fopen(name, "r"); /* VMS */
|
2013-07-22 16:15:27 -04:00
|
|
|
if(file == NULL) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
count = 0;
|
|
|
|
ret_stat = 1;
|
|
|
|
while(ret_stat > 0) {
|
|
|
|
ret_stat = fread(buffer, 1, sizeof(buffer), file);
|
|
|
|
if(ret_stat != 0)
|
|
|
|
count += ret_stat;
|
|
|
|
}
|
|
|
|
fclose(file);
|
|
|
|
|
|
|
|
return count;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
*
|
|
|
|
* VmsSpecialSize checks to see if the stat st_size can be trusted and
|
|
|
|
* if not to call a routine to get the correct size.
|
|
|
|
*
|
|
|
|
*/
|
2016-11-23 01:53:24 -05:00
|
|
|
static curl_off_t VmsSpecialSize(const char *name,
|
|
|
|
const struct_stat *stat_buf)
|
2013-07-22 16:15:27 -04:00
|
|
|
{
|
|
|
|
switch(stat_buf->st_fab_rfm) {
|
|
|
|
case FAB$C_VAR:
|
|
|
|
case FAB$C_VFC:
|
|
|
|
return vms_realfilesize(name, stat_buf);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return stat_buf->st_size;
|
|
|
|
}
|
|
|
|
}
|
2013-07-29 10:32:29 -04:00
|
|
|
#endif /* __VMS */
|
2013-07-22 16:15:27 -04:00
|
|
|
|
2017-04-24 06:03:08 -04:00
|
|
|
#define BUFFER_SIZE (100*1024)
|
|
|
|
|
2014-02-23 11:37:28 -05:00
|
|
|
static CURLcode operate_do(struct GlobalConfig *global,
|
|
|
|
struct OperationConfig *config)
|
2011-10-04 18:03:20 -04:00
|
|
|
{
|
|
|
|
char errorbuffer[CURL_ERROR_SIZE];
|
|
|
|
struct ProgressData progressbar;
|
|
|
|
struct getout *urlnode;
|
|
|
|
|
2012-06-08 23:42:39 -04:00
|
|
|
struct HdrCbData hdrcbdata;
|
2011-10-04 18:03:20 -04:00
|
|
|
struct OutStruct heads;
|
|
|
|
|
2012-05-25 06:24:32 -04:00
|
|
|
metalinkfile *mlfile_last = NULL;
|
2012-04-28 09:53:34 -04:00
|
|
|
|
2014-02-02 10:28:25 -05:00
|
|
|
CURL *curl = config->easy;
|
2011-10-04 18:03:20 -04:00
|
|
|
char *httpgetfields = NULL;
|
|
|
|
|
2014-12-16 02:35:47 -05:00
|
|
|
CURLcode result = CURLE_OK;
|
2013-08-15 07:05:25 -04:00
|
|
|
unsigned long li;
|
2016-03-28 16:46:26 -04:00
|
|
|
bool capath_from_env;
|
2011-10-04 18:03:20 -04:00
|
|
|
|
2014-03-23 07:01:10 -04:00
|
|
|
/* Save the values of noprogress and isatty to restore them later on */
|
|
|
|
bool orig_noprogress = global->noprogress;
|
|
|
|
bool orig_isatty = global->isatty;
|
2012-06-20 12:00:53 -04:00
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
errorbuffer[0] = '\0';
|
2014-02-27 15:21:23 -05:00
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
/* default headers output stream is stdout */
|
2012-06-08 23:42:39 -04:00
|
|
|
memset(&hdrcbdata, 0, sizeof(struct HdrCbData));
|
2011-10-04 18:03:20 -04:00
|
|
|
memset(&heads, 0, sizeof(struct OutStruct));
|
|
|
|
heads.stream = stdout;
|
|
|
|
heads.config = config;
|
|
|
|
|
|
|
|
/*
|
|
|
|
** Beyond this point no return'ing from this function allowed.
|
|
|
|
** Jump to label 'quit_curl' in order to abandon this function
|
|
|
|
** from outside of nested loops further down below.
|
|
|
|
*/
|
|
|
|
|
2014-02-14 16:59:51 -05:00
|
|
|
/* Check we have a url */
|
2014-02-06 14:43:50 -05:00
|
|
|
if(!config->url_list || !config->url_list->url) {
|
2014-03-01 08:00:31 -05:00
|
|
|
helpf(global->errors, "no URL specified!\n");
|
2014-12-16 02:35:47 -05:00
|
|
|
result = CURLE_FAILED_INIT;
|
2011-10-04 18:03:20 -04:00
|
|
|
goto quit_curl;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* On WIN32 we can't set the path to curl-ca-bundle.crt
|
|
|
|
* at compile time. So we look here for the file in two ways:
|
|
|
|
* 1: look at the environment variable CURL_CA_BUNDLE for a path
|
|
|
|
* 2: if #1 isn't found, use the windows API function SearchPath()
|
|
|
|
* to find it along the app's path (includes app's dir and CWD)
|
|
|
|
*
|
|
|
|
* We support the environment variable thing for non-Windows platforms
|
|
|
|
* too. Just for the sake of it.
|
|
|
|
*/
|
2016-03-28 16:46:26 -04:00
|
|
|
capath_from_env = false;
|
2011-10-04 18:03:20 -04:00
|
|
|
if(!config->cacert &&
|
|
|
|
!config->capath &&
|
|
|
|
!config->insecure_ok) {
|
schannel: add support for CURLOPT_CAINFO
- Move verify_certificate functionality in schannel.c into a new
file called schannel_verify.c. Additionally, some structure defintions
from schannel.c have been moved to schannel.h to allow them to be
used in schannel_verify.c.
- Make verify_certificate functionality for Schannel available on
all versions of Windows instead of just Windows CE. verify_certificate
will be invoked on Windows CE or when the user specifies
CURLOPT_CAINFO and CURLOPT_SSL_VERIFYPEER.
- In verify_certificate, create a custom certificate chain engine that
exclusively trusts the certificate store backed by the CURLOPT_CAINFO
file.
- doc updates of --cacert/CAINFO support for schannel
- Use CERT_NAME_SEARCH_ALL_NAMES_FLAG when invoking CertGetNameString
when available. This implements a TODO in schannel.c to improve
handling of multiple SANs in a certificate. In particular, all SANs
will now be searched instead of just the first name.
- Update tool_operate.c to not search for the curl-ca-bundle.crt file
when using Schannel to maintain backward compatibility. Previously,
any curl-ca-bundle.crt file found in that search would have been
ignored by Schannel. But, with CAINFO support, the file found by
that search would have been used as the certificate store and
could cause issues for any users that have curl-ca-bundle.crt in
the search path.
- Update url.c to not set the build time CURL_CA_BUNDLE if the selected
SSL backend is Schannel. We allow setting CA location for schannel
only when explicitly specified by the user via CURLOPT_CAINFO /
--cacert.
- Add new test cases 3000 and 3001. These test cases check that the first
and last SAN, respectively, matches the connection hostname. New test
certificates have been added for these cases. For 3000, the certificate
prefix is Server-localhost-firstSAN and for 3001, the certificate
prefix is Server-localhost-secondSAN.
- Remove TODO 15.2 (Add support for custom server certificate
validation), this commit addresses it.
Closes https://github.com/curl/curl/pull/1325
2017-03-10 15:27:30 -05:00
|
|
|
struct curl_tlssessioninfo *tls_backend_info = NULL;
|
|
|
|
|
|
|
|
/* With the addition of CAINFO support for Schannel, this search could find
|
|
|
|
* a certificate bundle that was previously ignored. To maintain backward
|
|
|
|
* compatibility, only perform this search if not using Schannel.
|
|
|
|
*/
|
|
|
|
result = curl_easy_getinfo(config->easy,
|
|
|
|
CURLINFO_TLS_SSL_PTR,
|
|
|
|
&tls_backend_info);
|
|
|
|
if(result) {
|
|
|
|
goto quit_curl;
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
schannel: add support for CURLOPT_CAINFO
- Move verify_certificate functionality in schannel.c into a new
file called schannel_verify.c. Additionally, some structure defintions
from schannel.c have been moved to schannel.h to allow them to be
used in schannel_verify.c.
- Make verify_certificate functionality for Schannel available on
all versions of Windows instead of just Windows CE. verify_certificate
will be invoked on Windows CE or when the user specifies
CURLOPT_CAINFO and CURLOPT_SSL_VERIFYPEER.
- In verify_certificate, create a custom certificate chain engine that
exclusively trusts the certificate store backed by the CURLOPT_CAINFO
file.
- doc updates of --cacert/CAINFO support for schannel
- Use CERT_NAME_SEARCH_ALL_NAMES_FLAG when invoking CertGetNameString
when available. This implements a TODO in schannel.c to improve
handling of multiple SANs in a certificate. In particular, all SANs
will now be searched instead of just the first name.
- Update tool_operate.c to not search for the curl-ca-bundle.crt file
when using Schannel to maintain backward compatibility. Previously,
any curl-ca-bundle.crt file found in that search would have been
ignored by Schannel. But, with CAINFO support, the file found by
that search would have been used as the certificate store and
could cause issues for any users that have curl-ca-bundle.crt in
the search path.
- Update url.c to not set the build time CURL_CA_BUNDLE if the selected
SSL backend is Schannel. We allow setting CA location for schannel
only when explicitly specified by the user via CURLOPT_CAINFO /
--cacert.
- Add new test cases 3000 and 3001. These test cases check that the first
and last SAN, respectively, matches the connection hostname. New test
certificates have been added for these cases. For 3000, the certificate
prefix is Server-localhost-firstSAN and for 3001, the certificate
prefix is Server-localhost-secondSAN.
- Remove TODO 15.2 (Add support for custom server certificate
validation), this commit addresses it.
Closes https://github.com/curl/curl/pull/1325
2017-03-10 15:27:30 -05:00
|
|
|
|
|
|
|
/* Set the CA cert locations specified in the environment. For Windows if
|
|
|
|
* no environment-specified filename is found then check for CA bundle
|
|
|
|
* default filename curl-ca-bundle.crt in the user's PATH.
|
|
|
|
*
|
2019-01-29 04:09:29 -05:00
|
|
|
* If Schannel is the selected SSL backend then these locations are
|
|
|
|
* ignored. We allow setting CA location for schannel only when explicitly
|
|
|
|
* specified by the user via CURLOPT_CAINFO / --cacert.
|
schannel: add support for CURLOPT_CAINFO
- Move verify_certificate functionality in schannel.c into a new
file called schannel_verify.c. Additionally, some structure defintions
from schannel.c have been moved to schannel.h to allow them to be
used in schannel_verify.c.
- Make verify_certificate functionality for Schannel available on
all versions of Windows instead of just Windows CE. verify_certificate
will be invoked on Windows CE or when the user specifies
CURLOPT_CAINFO and CURLOPT_SSL_VERIFYPEER.
- In verify_certificate, create a custom certificate chain engine that
exclusively trusts the certificate store backed by the CURLOPT_CAINFO
file.
- doc updates of --cacert/CAINFO support for schannel
- Use CERT_NAME_SEARCH_ALL_NAMES_FLAG when invoking CertGetNameString
when available. This implements a TODO in schannel.c to improve
handling of multiple SANs in a certificate. In particular, all SANs
will now be searched instead of just the first name.
- Update tool_operate.c to not search for the curl-ca-bundle.crt file
when using Schannel to maintain backward compatibility. Previously,
any curl-ca-bundle.crt file found in that search would have been
ignored by Schannel. But, with CAINFO support, the file found by
that search would have been used as the certificate store and
could cause issues for any users that have curl-ca-bundle.crt in
the search path.
- Update url.c to not set the build time CURL_CA_BUNDLE if the selected
SSL backend is Schannel. We allow setting CA location for schannel
only when explicitly specified by the user via CURLOPT_CAINFO /
--cacert.
- Add new test cases 3000 and 3001. These test cases check that the first
and last SAN, respectively, matches the connection hostname. New test
certificates have been added for these cases. For 3000, the certificate
prefix is Server-localhost-firstSAN and for 3001, the certificate
prefix is Server-localhost-secondSAN.
- Remove TODO 15.2 (Add support for custom server certificate
validation), this commit addresses it.
Closes https://github.com/curl/curl/pull/1325
2017-03-10 15:27:30 -05:00
|
|
|
*/
|
|
|
|
if(tls_backend_info->backend != CURLSSLBACKEND_SCHANNEL) {
|
|
|
|
char *env;
|
|
|
|
env = curlx_getenv("CURL_CA_BUNDLE");
|
2011-10-04 18:03:20 -04:00
|
|
|
if(env) {
|
schannel: add support for CURLOPT_CAINFO
- Move verify_certificate functionality in schannel.c into a new
file called schannel_verify.c. Additionally, some structure defintions
from schannel.c have been moved to schannel.h to allow them to be
used in schannel_verify.c.
- Make verify_certificate functionality for Schannel available on
all versions of Windows instead of just Windows CE. verify_certificate
will be invoked on Windows CE or when the user specifies
CURLOPT_CAINFO and CURLOPT_SSL_VERIFYPEER.
- In verify_certificate, create a custom certificate chain engine that
exclusively trusts the certificate store backed by the CURLOPT_CAINFO
file.
- doc updates of --cacert/CAINFO support for schannel
- Use CERT_NAME_SEARCH_ALL_NAMES_FLAG when invoking CertGetNameString
when available. This implements a TODO in schannel.c to improve
handling of multiple SANs in a certificate. In particular, all SANs
will now be searched instead of just the first name.
- Update tool_operate.c to not search for the curl-ca-bundle.crt file
when using Schannel to maintain backward compatibility. Previously,
any curl-ca-bundle.crt file found in that search would have been
ignored by Schannel. But, with CAINFO support, the file found by
that search would have been used as the certificate store and
could cause issues for any users that have curl-ca-bundle.crt in
the search path.
- Update url.c to not set the build time CURL_CA_BUNDLE if the selected
SSL backend is Schannel. We allow setting CA location for schannel
only when explicitly specified by the user via CURLOPT_CAINFO /
--cacert.
- Add new test cases 3000 and 3001. These test cases check that the first
and last SAN, respectively, matches the connection hostname. New test
certificates have been added for these cases. For 3000, the certificate
prefix is Server-localhost-firstSAN and for 3001, the certificate
prefix is Server-localhost-secondSAN.
- Remove TODO 15.2 (Add support for custom server certificate
validation), this commit addresses it.
Closes https://github.com/curl/curl/pull/1325
2017-03-10 15:27:30 -05:00
|
|
|
config->cacert = strdup(env);
|
|
|
|
if(!config->cacert) {
|
2011-10-04 18:03:20 -04:00
|
|
|
curl_free(env);
|
2014-03-01 08:00:31 -05:00
|
|
|
helpf(global->errors, "out of memory\n");
|
2014-12-16 02:35:47 -05:00
|
|
|
result = CURLE_OUT_OF_MEMORY;
|
2011-10-04 18:03:20 -04:00
|
|
|
goto quit_curl;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else {
|
schannel: add support for CURLOPT_CAINFO
- Move verify_certificate functionality in schannel.c into a new
file called schannel_verify.c. Additionally, some structure defintions
from schannel.c have been moved to schannel.h to allow them to be
used in schannel_verify.c.
- Make verify_certificate functionality for Schannel available on
all versions of Windows instead of just Windows CE. verify_certificate
will be invoked on Windows CE or when the user specifies
CURLOPT_CAINFO and CURLOPT_SSL_VERIFYPEER.
- In verify_certificate, create a custom certificate chain engine that
exclusively trusts the certificate store backed by the CURLOPT_CAINFO
file.
- doc updates of --cacert/CAINFO support for schannel
- Use CERT_NAME_SEARCH_ALL_NAMES_FLAG when invoking CertGetNameString
when available. This implements a TODO in schannel.c to improve
handling of multiple SANs in a certificate. In particular, all SANs
will now be searched instead of just the first name.
- Update tool_operate.c to not search for the curl-ca-bundle.crt file
when using Schannel to maintain backward compatibility. Previously,
any curl-ca-bundle.crt file found in that search would have been
ignored by Schannel. But, with CAINFO support, the file found by
that search would have been used as the certificate store and
could cause issues for any users that have curl-ca-bundle.crt in
the search path.
- Update url.c to not set the build time CURL_CA_BUNDLE if the selected
SSL backend is Schannel. We allow setting CA location for schannel
only when explicitly specified by the user via CURLOPT_CAINFO /
--cacert.
- Add new test cases 3000 and 3001. These test cases check that the first
and last SAN, respectively, matches the connection hostname. New test
certificates have been added for these cases. For 3000, the certificate
prefix is Server-localhost-firstSAN and for 3001, the certificate
prefix is Server-localhost-secondSAN.
- Remove TODO 15.2 (Add support for custom server certificate
validation), this commit addresses it.
Closes https://github.com/curl/curl/pull/1325
2017-03-10 15:27:30 -05:00
|
|
|
env = curlx_getenv("SSL_CERT_DIR");
|
2011-10-04 18:03:20 -04:00
|
|
|
if(env) {
|
schannel: add support for CURLOPT_CAINFO
- Move verify_certificate functionality in schannel.c into a new
file called schannel_verify.c. Additionally, some structure defintions
from schannel.c have been moved to schannel.h to allow them to be
used in schannel_verify.c.
- Make verify_certificate functionality for Schannel available on
all versions of Windows instead of just Windows CE. verify_certificate
will be invoked on Windows CE or when the user specifies
CURLOPT_CAINFO and CURLOPT_SSL_VERIFYPEER.
- In verify_certificate, create a custom certificate chain engine that
exclusively trusts the certificate store backed by the CURLOPT_CAINFO
file.
- doc updates of --cacert/CAINFO support for schannel
- Use CERT_NAME_SEARCH_ALL_NAMES_FLAG when invoking CertGetNameString
when available. This implements a TODO in schannel.c to improve
handling of multiple SANs in a certificate. In particular, all SANs
will now be searched instead of just the first name.
- Update tool_operate.c to not search for the curl-ca-bundle.crt file
when using Schannel to maintain backward compatibility. Previously,
any curl-ca-bundle.crt file found in that search would have been
ignored by Schannel. But, with CAINFO support, the file found by
that search would have been used as the certificate store and
could cause issues for any users that have curl-ca-bundle.crt in
the search path.
- Update url.c to not set the build time CURL_CA_BUNDLE if the selected
SSL backend is Schannel. We allow setting CA location for schannel
only when explicitly specified by the user via CURLOPT_CAINFO /
--cacert.
- Add new test cases 3000 and 3001. These test cases check that the first
and last SAN, respectively, matches the connection hostname. New test
certificates have been added for these cases. For 3000, the certificate
prefix is Server-localhost-firstSAN and for 3001, the certificate
prefix is Server-localhost-secondSAN.
- Remove TODO 15.2 (Add support for custom server certificate
validation), this commit addresses it.
Closes https://github.com/curl/curl/pull/1325
2017-03-10 15:27:30 -05:00
|
|
|
config->capath = strdup(env);
|
|
|
|
if(!config->capath) {
|
2011-10-04 18:03:20 -04:00
|
|
|
curl_free(env);
|
2014-03-01 08:00:31 -05:00
|
|
|
helpf(global->errors, "out of memory\n");
|
2014-12-16 02:35:47 -05:00
|
|
|
result = CURLE_OUT_OF_MEMORY;
|
2011-10-04 18:03:20 -04:00
|
|
|
goto quit_curl;
|
|
|
|
}
|
schannel: add support for CURLOPT_CAINFO
- Move verify_certificate functionality in schannel.c into a new
file called schannel_verify.c. Additionally, some structure defintions
from schannel.c have been moved to schannel.h to allow them to be
used in schannel_verify.c.
- Make verify_certificate functionality for Schannel available on
all versions of Windows instead of just Windows CE. verify_certificate
will be invoked on Windows CE or when the user specifies
CURLOPT_CAINFO and CURLOPT_SSL_VERIFYPEER.
- In verify_certificate, create a custom certificate chain engine that
exclusively trusts the certificate store backed by the CURLOPT_CAINFO
file.
- doc updates of --cacert/CAINFO support for schannel
- Use CERT_NAME_SEARCH_ALL_NAMES_FLAG when invoking CertGetNameString
when available. This implements a TODO in schannel.c to improve
handling of multiple SANs in a certificate. In particular, all SANs
will now be searched instead of just the first name.
- Update tool_operate.c to not search for the curl-ca-bundle.crt file
when using Schannel to maintain backward compatibility. Previously,
any curl-ca-bundle.crt file found in that search would have been
ignored by Schannel. But, with CAINFO support, the file found by
that search would have been used as the certificate store and
could cause issues for any users that have curl-ca-bundle.crt in
the search path.
- Update url.c to not set the build time CURL_CA_BUNDLE if the selected
SSL backend is Schannel. We allow setting CA location for schannel
only when explicitly specified by the user via CURLOPT_CAINFO /
--cacert.
- Add new test cases 3000 and 3001. These test cases check that the first
and last SAN, respectively, matches the connection hostname. New test
certificates have been added for these cases. For 3000, the certificate
prefix is Server-localhost-firstSAN and for 3001, the certificate
prefix is Server-localhost-secondSAN.
- Remove TODO 15.2 (Add support for custom server certificate
validation), this commit addresses it.
Closes https://github.com/curl/curl/pull/1325
2017-03-10 15:27:30 -05:00
|
|
|
capath_from_env = true;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
env = curlx_getenv("SSL_CERT_FILE");
|
|
|
|
if(env) {
|
|
|
|
config->cacert = strdup(env);
|
|
|
|
if(!config->cacert) {
|
|
|
|
curl_free(env);
|
|
|
|
helpf(global->errors, "out of memory\n");
|
|
|
|
result = CURLE_OUT_OF_MEMORY;
|
|
|
|
goto quit_curl;
|
|
|
|
}
|
|
|
|
}
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
schannel: add support for CURLOPT_CAINFO
- Move verify_certificate functionality in schannel.c into a new
file called schannel_verify.c. Additionally, some structure defintions
from schannel.c have been moved to schannel.h to allow them to be
used in schannel_verify.c.
- Make verify_certificate functionality for Schannel available on
all versions of Windows instead of just Windows CE. verify_certificate
will be invoked on Windows CE or when the user specifies
CURLOPT_CAINFO and CURLOPT_SSL_VERIFYPEER.
- In verify_certificate, create a custom certificate chain engine that
exclusively trusts the certificate store backed by the CURLOPT_CAINFO
file.
- doc updates of --cacert/CAINFO support for schannel
- Use CERT_NAME_SEARCH_ALL_NAMES_FLAG when invoking CertGetNameString
when available. This implements a TODO in schannel.c to improve
handling of multiple SANs in a certificate. In particular, all SANs
will now be searched instead of just the first name.
- Update tool_operate.c to not search for the curl-ca-bundle.crt file
when using Schannel to maintain backward compatibility. Previously,
any curl-ca-bundle.crt file found in that search would have been
ignored by Schannel. But, with CAINFO support, the file found by
that search would have been used as the certificate store and
could cause issues for any users that have curl-ca-bundle.crt in
the search path.
- Update url.c to not set the build time CURL_CA_BUNDLE if the selected
SSL backend is Schannel. We allow setting CA location for schannel
only when explicitly specified by the user via CURLOPT_CAINFO /
--cacert.
- Add new test cases 3000 and 3001. These test cases check that the first
and last SAN, respectively, matches the connection hostname. New test
certificates have been added for these cases. For 3000, the certificate
prefix is Server-localhost-firstSAN and for 3001, the certificate
prefix is Server-localhost-secondSAN.
- Remove TODO 15.2 (Add support for custom server certificate
validation), this commit addresses it.
Closes https://github.com/curl/curl/pull/1325
2017-03-10 15:27:30 -05:00
|
|
|
if(env)
|
|
|
|
curl_free(env);
|
2011-10-04 18:03:20 -04:00
|
|
|
#ifdef WIN32
|
schannel: add support for CURLOPT_CAINFO
- Move verify_certificate functionality in schannel.c into a new
file called schannel_verify.c. Additionally, some structure defintions
from schannel.c have been moved to schannel.h to allow them to be
used in schannel_verify.c.
- Make verify_certificate functionality for Schannel available on
all versions of Windows instead of just Windows CE. verify_certificate
will be invoked on Windows CE or when the user specifies
CURLOPT_CAINFO and CURLOPT_SSL_VERIFYPEER.
- In verify_certificate, create a custom certificate chain engine that
exclusively trusts the certificate store backed by the CURLOPT_CAINFO
file.
- doc updates of --cacert/CAINFO support for schannel
- Use CERT_NAME_SEARCH_ALL_NAMES_FLAG when invoking CertGetNameString
when available. This implements a TODO in schannel.c to improve
handling of multiple SANs in a certificate. In particular, all SANs
will now be searched instead of just the first name.
- Update tool_operate.c to not search for the curl-ca-bundle.crt file
when using Schannel to maintain backward compatibility. Previously,
any curl-ca-bundle.crt file found in that search would have been
ignored by Schannel. But, with CAINFO support, the file found by
that search would have been used as the certificate store and
could cause issues for any users that have curl-ca-bundle.crt in
the search path.
- Update url.c to not set the build time CURL_CA_BUNDLE if the selected
SSL backend is Schannel. We allow setting CA location for schannel
only when explicitly specified by the user via CURLOPT_CAINFO /
--cacert.
- Add new test cases 3000 and 3001. These test cases check that the first
and last SAN, respectively, matches the connection hostname. New test
certificates have been added for these cases. For 3000, the certificate
prefix is Server-localhost-firstSAN and for 3001, the certificate
prefix is Server-localhost-secondSAN.
- Remove TODO 15.2 (Add support for custom server certificate
validation), this commit addresses it.
Closes https://github.com/curl/curl/pull/1325
2017-03-10 15:27:30 -05:00
|
|
|
else {
|
|
|
|
result = FindWin32CACert(config, tls_backend_info->backend,
|
|
|
|
"curl-ca-bundle.crt");
|
|
|
|
if(result)
|
|
|
|
goto quit_curl;
|
|
|
|
}
|
2011-10-04 18:03:20 -04:00
|
|
|
#endif
|
schannel: add support for CURLOPT_CAINFO
- Move verify_certificate functionality in schannel.c into a new
file called schannel_verify.c. Additionally, some structure defintions
from schannel.c have been moved to schannel.h to allow them to be
used in schannel_verify.c.
- Make verify_certificate functionality for Schannel available on
all versions of Windows instead of just Windows CE. verify_certificate
will be invoked on Windows CE or when the user specifies
CURLOPT_CAINFO and CURLOPT_SSL_VERIFYPEER.
- In verify_certificate, create a custom certificate chain engine that
exclusively trusts the certificate store backed by the CURLOPT_CAINFO
file.
- doc updates of --cacert/CAINFO support for schannel
- Use CERT_NAME_SEARCH_ALL_NAMES_FLAG when invoking CertGetNameString
when available. This implements a TODO in schannel.c to improve
handling of multiple SANs in a certificate. In particular, all SANs
will now be searched instead of just the first name.
- Update tool_operate.c to not search for the curl-ca-bundle.crt file
when using Schannel to maintain backward compatibility. Previously,
any curl-ca-bundle.crt file found in that search would have been
ignored by Schannel. But, with CAINFO support, the file found by
that search would have been used as the certificate store and
could cause issues for any users that have curl-ca-bundle.crt in
the search path.
- Update url.c to not set the build time CURL_CA_BUNDLE if the selected
SSL backend is Schannel. We allow setting CA location for schannel
only when explicitly specified by the user via CURLOPT_CAINFO /
--cacert.
- Add new test cases 3000 and 3001. These test cases check that the first
and last SAN, respectively, matches the connection hostname. New test
certificates have been added for these cases. For 3000, the certificate
prefix is Server-localhost-firstSAN and for 3001, the certificate
prefix is Server-localhost-secondSAN.
- Remove TODO 15.2 (Add support for custom server certificate
validation), this commit addresses it.
Closes https://github.com/curl/curl/pull/1325
2017-03-10 15:27:30 -05:00
|
|
|
}
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if(config->postfields) {
|
|
|
|
if(config->use_httpget) {
|
|
|
|
/* Use the postfields data for a http get */
|
|
|
|
httpgetfields = strdup(config->postfields);
|
|
|
|
Curl_safefree(config->postfields);
|
2011-10-05 09:06:26 -04:00
|
|
|
if(!httpgetfields) {
|
2014-03-01 08:00:31 -05:00
|
|
|
helpf(global->errors, "out of memory\n");
|
2014-12-16 02:35:47 -05:00
|
|
|
result = CURLE_OUT_OF_MEMORY;
|
2011-10-05 09:06:26 -04:00
|
|
|
goto quit_curl;
|
|
|
|
}
|
2011-10-04 18:03:20 -04:00
|
|
|
if(SetHTTPrequest(config,
|
|
|
|
(config->no_body?HTTPREQ_HEAD:HTTPREQ_GET),
|
|
|
|
&config->httpreq)) {
|
2014-12-16 02:35:47 -05:00
|
|
|
result = CURLE_FAILED_INIT;
|
2011-10-04 18:03:20 -04:00
|
|
|
goto quit_curl;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
if(SetHTTPrequest(config, HTTPREQ_SIMPLEPOST, &config->httpreq)) {
|
2014-12-16 02:35:47 -05:00
|
|
|
result = CURLE_FAILED_INIT;
|
2011-10-04 18:03:20 -04:00
|
|
|
goto quit_curl;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Single header file for all URLs */
|
|
|
|
if(config->headerfile) {
|
|
|
|
/* open file for output: */
|
2016-09-30 11:15:05 -04:00
|
|
|
if(strcmp(config->headerfile, "-")) {
|
2011-10-04 18:03:20 -04:00
|
|
|
FILE *newfile = fopen(config->headerfile, "wb");
|
|
|
|
if(!newfile) {
|
2015-02-27 15:48:38 -05:00
|
|
|
warnf(config->global, "Failed to open %s\n", config->headerfile);
|
2014-12-16 02:35:47 -05:00
|
|
|
result = CURLE_WRITE_ERROR;
|
2011-10-04 18:03:20 -04:00
|
|
|
goto quit_curl;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
heads.filename = config->headerfile;
|
|
|
|
heads.s_isreg = TRUE;
|
|
|
|
heads.fopened = TRUE;
|
|
|
|
heads.stream = newfile;
|
|
|
|
}
|
|
|
|
}
|
2014-02-01 08:02:34 -05:00
|
|
|
else {
|
|
|
|
/* always use binary mode for protocol header output */
|
|
|
|
set_binmode(heads.stream);
|
|
|
|
}
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
** Nested loops start here.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* loop through the list of given URLs */
|
|
|
|
|
|
|
|
for(urlnode = config->url_list; urlnode; urlnode = urlnode->next) {
|
|
|
|
|
2013-08-15 07:05:25 -04:00
|
|
|
unsigned long up; /* upload file counter within a single upload glob */
|
2011-10-04 18:03:20 -04:00
|
|
|
char *infiles; /* might be a glob pattern */
|
|
|
|
char *outfiles;
|
2013-08-15 07:05:25 -04:00
|
|
|
unsigned long infilenum;
|
2011-10-04 18:03:20 -04:00
|
|
|
URLGlob *inglob;
|
2012-04-28 10:46:32 -04:00
|
|
|
|
2012-05-26 09:51:03 -04:00
|
|
|
int metalink = 0; /* nonzero for metalink download. */
|
2012-05-25 06:24:32 -04:00
|
|
|
metalinkfile *mlfile;
|
|
|
|
metalink_resource *mlres;
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
outfiles = NULL;
|
2012-02-06 04:46:25 -05:00
|
|
|
infilenum = 1;
|
2011-10-04 18:03:20 -04:00
|
|
|
inglob = NULL;
|
|
|
|
|
2012-04-28 08:48:56 -04:00
|
|
|
if(urlnode->flags & GETOUT_METALINK) {
|
|
|
|
metalink = 1;
|
2012-04-28 10:46:32 -04:00
|
|
|
if(mlfile_last == NULL) {
|
|
|
|
mlfile_last = config->metalinkfile_list;
|
|
|
|
}
|
2012-04-28 09:53:34 -04:00
|
|
|
mlfile = mlfile_last;
|
|
|
|
mlfile_last = mlfile_last->next;
|
2012-05-25 06:24:32 -04:00
|
|
|
mlres = mlfile->resource;
|
2012-04-28 08:48:56 -04:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
mlfile = NULL;
|
|
|
|
mlres = NULL;
|
|
|
|
}
|
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
/* urlnode->url is the full URL (it might be NULL) */
|
|
|
|
|
|
|
|
if(!urlnode->url) {
|
|
|
|
/* This node has no URL. Free node data without destroying the
|
|
|
|
node itself nor modifying next pointer and continue to next */
|
|
|
|
Curl_safefree(urlnode->outfile);
|
|
|
|
Curl_safefree(urlnode->infile);
|
|
|
|
urlnode->flags = 0;
|
|
|
|
continue; /* next URL please */
|
|
|
|
}
|
|
|
|
|
|
|
|
/* save outfile pattern before expansion */
|
|
|
|
if(urlnode->outfile) {
|
|
|
|
outfiles = strdup(urlnode->outfile);
|
|
|
|
if(!outfiles) {
|
2014-03-01 08:00:31 -05:00
|
|
|
helpf(global->errors, "out of memory\n");
|
2014-12-16 02:35:47 -05:00
|
|
|
result = CURLE_OUT_OF_MEMORY;
|
2011-10-04 18:03:20 -04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
infiles = urlnode->infile;
|
|
|
|
|
|
|
|
if(!config->globoff && infiles) {
|
|
|
|
/* Unless explicitly shut off */
|
2014-12-16 02:35:47 -05:00
|
|
|
result = glob_url(&inglob, infiles, &infilenum,
|
|
|
|
global->showerror?global->errors:NULL);
|
|
|
|
if(result) {
|
2011-10-04 18:03:20 -04:00
|
|
|
Curl_safefree(outfiles);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Here's the loop for uploading multiple files within the same
|
|
|
|
single globbed string. If no upload, we enter the loop once anyway. */
|
2012-02-06 04:46:25 -05:00
|
|
|
for(up = 0 ; up < infilenum; up++) {
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
char *uploadfile; /* a single file, never a glob */
|
|
|
|
int separator;
|
|
|
|
URLGlob *urls;
|
2013-08-15 07:05:25 -04:00
|
|
|
unsigned long urlnum;
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
uploadfile = NULL;
|
|
|
|
urls = NULL;
|
|
|
|
urlnum = 0;
|
|
|
|
|
|
|
|
if(!up && !infiles)
|
|
|
|
Curl_nop_stmt;
|
|
|
|
else {
|
2011-10-05 16:01:42 -04:00
|
|
|
if(inglob) {
|
2014-12-16 02:35:47 -05:00
|
|
|
result = glob_next_url(&uploadfile, inglob);
|
|
|
|
if(result == CURLE_OUT_OF_MEMORY)
|
2014-03-01 08:00:31 -05:00
|
|
|
helpf(global->errors, "out of memory\n");
|
2011-10-05 16:01:42 -04:00
|
|
|
}
|
|
|
|
else if(!up) {
|
2011-10-04 18:03:20 -04:00
|
|
|
uploadfile = strdup(infiles);
|
2011-10-05 16:01:42 -04:00
|
|
|
if(!uploadfile) {
|
2014-03-01 08:00:31 -05:00
|
|
|
helpf(global->errors, "out of memory\n");
|
2014-12-16 02:35:47 -05:00
|
|
|
result = CURLE_OUT_OF_MEMORY;
|
2011-10-05 16:01:42 -04:00
|
|
|
}
|
|
|
|
}
|
2011-10-04 18:03:20 -04:00
|
|
|
else
|
|
|
|
uploadfile = NULL;
|
|
|
|
if(!uploadfile)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2012-04-28 08:48:56 -04:00
|
|
|
if(metalink) {
|
|
|
|
/* For Metalink download, we don't use glob. Instead we use
|
|
|
|
the number of resources as urlnum. */
|
|
|
|
urlnum = count_next_metalink_resource(mlfile);
|
|
|
|
}
|
2018-04-25 15:53:27 -04:00
|
|
|
else if(!config->globoff) {
|
2011-10-04 18:03:20 -04:00
|
|
|
/* Unless explicitly shut off, we expand '{...}' and '[...]'
|
|
|
|
expressions and return total number of URLs in pattern set */
|
2014-12-16 02:35:47 -05:00
|
|
|
result = glob_url(&urls, urlnode->url, &urlnum,
|
|
|
|
global->showerror?global->errors:NULL);
|
|
|
|
if(result) {
|
2011-10-04 18:03:20 -04:00
|
|
|
Curl_safefree(uploadfile);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
urlnum = 1; /* without globbing, this is a single URL */
|
|
|
|
|
|
|
|
/* if multiple files extracted to stdout, insert separators! */
|
2017-09-09 17:09:06 -04:00
|
|
|
separator = ((!outfiles || !strcmp(outfiles, "-")) && urlnum > 1);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
/* Here's looping around each globbed URL */
|
2013-08-15 07:05:25 -04:00
|
|
|
for(li = 0 ; li < urlnum; li++) {
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
int infd;
|
|
|
|
bool infdopen;
|
|
|
|
char *outfile;
|
|
|
|
struct OutStruct outs;
|
|
|
|
struct InStruct input;
|
|
|
|
struct timeval retrystart;
|
|
|
|
curl_off_t uploadfilesize;
|
|
|
|
long retry_numretries;
|
|
|
|
long retry_sleep_default;
|
|
|
|
long retry_sleep;
|
2013-02-19 21:03:39 -05:00
|
|
|
char *this_url = NULL;
|
2012-04-28 10:46:32 -04:00
|
|
|
int metalink_next_res = 0;
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
outfile = NULL;
|
|
|
|
infdopen = FALSE;
|
|
|
|
infd = STDIN_FILENO;
|
|
|
|
uploadfilesize = -1; /* -1 means unknown */
|
|
|
|
|
|
|
|
/* default output stream is stdout */
|
|
|
|
memset(&outs, 0, sizeof(struct OutStruct));
|
|
|
|
outs.stream = stdout;
|
|
|
|
outs.config = config;
|
|
|
|
|
2012-04-28 08:48:56 -04:00
|
|
|
if(metalink) {
|
2012-04-28 10:46:32 -04:00
|
|
|
/* For Metalink download, use name in Metalink file as
|
|
|
|
filename. */
|
2012-05-25 06:24:32 -04:00
|
|
|
outfile = strdup(mlfile->filename);
|
2012-04-28 08:48:56 -04:00
|
|
|
if(!outfile) {
|
2014-12-16 02:35:47 -05:00
|
|
|
result = CURLE_OUT_OF_MEMORY;
|
2011-10-05 16:01:42 -04:00
|
|
|
goto show_error;
|
2012-04-28 08:48:56 -04:00
|
|
|
}
|
2012-05-25 06:24:32 -04:00
|
|
|
this_url = strdup(mlres->url);
|
2011-10-05 16:01:42 -04:00
|
|
|
if(!this_url) {
|
2014-12-16 02:35:47 -05:00
|
|
|
result = CURLE_OUT_OF_MEMORY;
|
2011-10-05 16:01:42 -04:00
|
|
|
goto show_error;
|
|
|
|
}
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
2012-04-28 08:48:56 -04:00
|
|
|
else {
|
|
|
|
if(urls) {
|
2014-12-16 02:35:47 -05:00
|
|
|
result = glob_next_url(&this_url, urls);
|
|
|
|
if(result)
|
2012-04-28 08:48:56 -04:00
|
|
|
goto show_error;
|
|
|
|
}
|
2013-08-15 07:05:25 -04:00
|
|
|
else if(!li) {
|
2012-04-28 08:48:56 -04:00
|
|
|
this_url = strdup(urlnode->url);
|
|
|
|
if(!this_url) {
|
2014-12-16 02:35:47 -05:00
|
|
|
result = CURLE_OUT_OF_MEMORY;
|
2012-04-28 08:48:56 -04:00
|
|
|
goto show_error;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
this_url = NULL;
|
|
|
|
if(!this_url)
|
|
|
|
break;
|
2011-10-04 18:03:20 -04:00
|
|
|
|
2012-04-28 08:48:56 -04:00
|
|
|
if(outfiles) {
|
|
|
|
outfile = strdup(outfiles);
|
|
|
|
if(!outfile) {
|
2014-12-16 02:35:47 -05:00
|
|
|
result = CURLE_OUT_OF_MEMORY;
|
2012-04-28 08:48:56 -04:00
|
|
|
goto show_error;
|
|
|
|
}
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-06-20 11:51:06 -04:00
|
|
|
if(((urlnode->flags&GETOUT_USEREMOTE) ||
|
2016-09-30 11:15:05 -04:00
|
|
|
(outfile && strcmp("-", outfile))) &&
|
2012-06-20 11:51:06 -04:00
|
|
|
(metalink || !config->use_metalink)) {
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* We have specified a file name to store the result in, or we have
|
|
|
|
* decided we want to use the remote file name.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if(!outfile) {
|
|
|
|
/* extract the file name from the URL */
|
2014-12-16 02:35:47 -05:00
|
|
|
result = get_url_file_name(&outfile, this_url);
|
|
|
|
if(result)
|
2011-10-05 09:06:26 -04:00
|
|
|
goto show_error;
|
2014-10-08 06:21:39 -04:00
|
|
|
if(!*outfile && !config->content_disposition) {
|
2014-03-01 08:00:31 -05:00
|
|
|
helpf(global->errors, "Remote file name has no length!\n");
|
2014-12-16 02:35:47 -05:00
|
|
|
result = CURLE_WRITE_ERROR;
|
2011-10-04 18:03:20 -04:00
|
|
|
goto quit_urls;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else if(urls) {
|
|
|
|
/* fill '#1' ... '#9' terms from URL pattern */
|
|
|
|
char *storefile = outfile;
|
2014-12-16 02:35:47 -05:00
|
|
|
result = glob_match_url(&outfile, storefile, urls);
|
2011-10-04 18:03:20 -04:00
|
|
|
Curl_safefree(storefile);
|
2014-12-16 02:35:47 -05:00
|
|
|
if(result) {
|
2011-10-04 18:03:20 -04:00
|
|
|
/* bad globbing */
|
2015-02-27 15:48:38 -05:00
|
|
|
warnf(config->global, "bad output glob!\n");
|
2011-10-04 18:03:20 -04:00
|
|
|
goto quit_urls;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Create the directory hierarchy, if not pre-existent to a multiple
|
|
|
|
file output call */
|
|
|
|
|
2012-05-14 09:46:15 -04:00
|
|
|
if(config->create_dirs || metalink) {
|
2014-12-16 02:35:47 -05:00
|
|
|
result = create_dir_hierarchy(outfile, global->errors);
|
2011-10-04 18:03:20 -04:00
|
|
|
/* create_dir_hierarchy shows error upon CURLE_WRITE_ERROR */
|
2014-12-16 02:35:47 -05:00
|
|
|
if(result == CURLE_WRITE_ERROR)
|
2011-10-04 18:03:20 -04:00
|
|
|
goto quit_urls;
|
2014-12-16 02:35:47 -05:00
|
|
|
if(result) {
|
2011-10-04 18:03:20 -04:00
|
|
|
goto show_error;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if((urlnode->flags & GETOUT_USEREMOTE)
|
|
|
|
&& config->content_disposition) {
|
2011-11-20 17:33:46 -05:00
|
|
|
/* Our header callback MIGHT set the filename */
|
2011-10-04 18:03:20 -04:00
|
|
|
DEBUGASSERT(!outs.filename);
|
|
|
|
}
|
|
|
|
|
2011-11-20 17:33:46 -05:00
|
|
|
if(config->resume_from_current) {
|
|
|
|
/* We're told to continue from where we are now. Get the size
|
|
|
|
of the file as it is now and open it for append instead */
|
|
|
|
struct_stat fileinfo;
|
|
|
|
/* VMS -- Danger, the filesize is only valid for stream files */
|
|
|
|
if(0 == stat(outfile, &fileinfo))
|
|
|
|
/* set offset to current file size: */
|
|
|
|
config->resume_from = fileinfo.st_size;
|
|
|
|
else
|
|
|
|
/* let offset be 0 */
|
|
|
|
config->resume_from = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(config->resume_from) {
|
2013-07-29 10:32:29 -04:00
|
|
|
#ifdef __VMS
|
|
|
|
/* open file for output, forcing VMS output format into stream
|
|
|
|
mode which is needed for stat() call above to always work. */
|
2013-07-22 16:15:27 -04:00
|
|
|
FILE *file = fopen(outfile, config->resume_from?"ab":"wb",
|
|
|
|
"ctx=stm", "rfm=stmlf", "rat=cr", "mrs=0");
|
2013-07-29 10:32:29 -04:00
|
|
|
#else
|
|
|
|
/* open file for output: */
|
|
|
|
FILE *file = fopen(outfile, config->resume_from?"ab":"wb");
|
2013-07-22 16:15:27 -04:00
|
|
|
#endif
|
2011-11-20 17:33:46 -05:00
|
|
|
if(!file) {
|
2014-03-01 08:00:31 -05:00
|
|
|
helpf(global->errors, "Can't open '%s'!\n", outfile);
|
2014-12-16 02:35:47 -05:00
|
|
|
result = CURLE_WRITE_ERROR;
|
2011-11-20 17:33:46 -05:00
|
|
|
goto quit_urls;
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
2011-11-20 17:33:46 -05:00
|
|
|
outs.fopened = TRUE;
|
|
|
|
outs.stream = file;
|
|
|
|
outs.init = config->resume_from;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
outs.stream = NULL; /* open when needed */
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
2011-11-20 17:33:46 -05:00
|
|
|
outs.filename = outfile;
|
|
|
|
outs.s_isreg = TRUE;
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if(uploadfile && !stdin_upload(uploadfile)) {
|
|
|
|
/*
|
|
|
|
* We have specified a file to upload and it isn't "-".
|
|
|
|
*/
|
|
|
|
struct_stat fileinfo;
|
|
|
|
|
|
|
|
this_url = add_file_name_to_url(curl, this_url, uploadfile);
|
|
|
|
if(!this_url) {
|
2014-12-16 02:35:47 -05:00
|
|
|
result = CURLE_OUT_OF_MEMORY;
|
2011-10-04 18:03:20 -04:00
|
|
|
goto show_error;
|
|
|
|
}
|
|
|
|
/* VMS Note:
|
|
|
|
*
|
|
|
|
* Reading binary from files can be a problem... Only FIXED, VAR
|
|
|
|
* etc WITHOUT implied CC will work Others need a \n appended to a
|
|
|
|
* line
|
|
|
|
*
|
|
|
|
* - Stat gives a size but this is UNRELIABLE in VMS As a f.e. a
|
|
|
|
* fixed file with implied CC needs to have a byte added for every
|
|
|
|
* record processed, this can by derived from Filesize & recordsize
|
|
|
|
* for VARiable record files the records need to be counted! for
|
|
|
|
* every record add 1 for linefeed and subtract 2 for the record
|
|
|
|
* header for VARIABLE header files only the bare record data needs
|
|
|
|
* to be considered with one appended if implied CC
|
|
|
|
*/
|
2013-07-29 10:32:29 -04:00
|
|
|
#ifdef __VMS
|
2018-02-05 15:57:39 -05:00
|
|
|
/* Calculate the real upload size for VMS */
|
2013-07-22 16:15:27 -04:00
|
|
|
infd = -1;
|
|
|
|
if(stat(uploadfile, &fileinfo) == 0) {
|
|
|
|
fileinfo.st_size = VmsSpecialSize(uploadfile, &fileinfo);
|
2016-12-13 17:34:59 -05:00
|
|
|
switch(fileinfo.st_fab_rfm) {
|
2013-07-22 16:15:27 -04:00
|
|
|
case FAB$C_VAR:
|
|
|
|
case FAB$C_VFC:
|
|
|
|
case FAB$C_STMCR:
|
|
|
|
infd = open(uploadfile, O_RDONLY | O_BINARY);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
infd = open(uploadfile, O_RDONLY | O_BINARY,
|
|
|
|
"rfm=stmlf", "ctx=stm");
|
|
|
|
}
|
|
|
|
}
|
2013-07-29 10:32:29 -04:00
|
|
|
if(infd == -1)
|
|
|
|
#else
|
|
|
|
infd = open(uploadfile, O_RDONLY | O_BINARY);
|
|
|
|
if((infd == -1) || fstat(infd, &fileinfo))
|
2013-07-22 16:15:27 -04:00
|
|
|
#endif
|
2013-07-29 10:32:29 -04:00
|
|
|
{
|
2014-03-01 08:00:31 -05:00
|
|
|
helpf(global->errors, "Can't open '%s'!\n", uploadfile);
|
2011-10-04 18:03:20 -04:00
|
|
|
if(infd != -1) {
|
|
|
|
close(infd);
|
|
|
|
infd = STDIN_FILENO;
|
|
|
|
}
|
2014-12-16 02:35:47 -05:00
|
|
|
result = CURLE_READ_ERROR;
|
2011-10-04 18:03:20 -04:00
|
|
|
goto quit_urls;
|
|
|
|
}
|
|
|
|
infdopen = TRUE;
|
|
|
|
|
|
|
|
/* we ignore file size for char/block devices, sockets, etc. */
|
|
|
|
if(S_ISREG(fileinfo.st_mode))
|
|
|
|
uploadfilesize = fileinfo.st_size;
|
|
|
|
|
|
|
|
}
|
|
|
|
else if(uploadfile && stdin_upload(uploadfile)) {
|
|
|
|
/* count to see if there are more than one auth bit set
|
|
|
|
in the authtype field */
|
|
|
|
int authbits = 0;
|
|
|
|
int bitcheck = 0;
|
|
|
|
while(bitcheck < 32) {
|
2012-04-18 17:04:35 -04:00
|
|
|
if(config->authtype & (1UL << bitcheck++)) {
|
2011-10-04 18:03:20 -04:00
|
|
|
authbits++;
|
|
|
|
if(authbits > 1) {
|
|
|
|
/* more than one, we're done! */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If the user has also selected --anyauth or --proxy-anyauth
|
|
|
|
* we should warn him/her.
|
|
|
|
*/
|
|
|
|
if(config->proxyanyauth || (authbits>1)) {
|
2015-02-27 15:48:38 -05:00
|
|
|
warnf(config->global,
|
2011-10-04 18:03:20 -04:00
|
|
|
"Using --anyauth or --proxy-anyauth with upload from stdin"
|
|
|
|
" involves a big risk of it not working. Use a temporary"
|
|
|
|
" file or a fixed auth type instead!\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
DEBUGASSERT(infdopen == FALSE);
|
|
|
|
DEBUGASSERT(infd == STDIN_FILENO);
|
|
|
|
|
|
|
|
set_binmode(stdin);
|
2016-09-30 11:15:05 -04:00
|
|
|
if(!strcmp(uploadfile, ".")) {
|
2011-10-04 18:03:20 -04:00
|
|
|
if(curlx_nonblock((curl_socket_t)infd, TRUE) < 0)
|
2015-02-27 15:48:38 -05:00
|
|
|
warnf(config->global,
|
2011-10-04 18:03:20 -04:00
|
|
|
"fcntl failed on fd=%d: %s\n", infd, strerror(errno));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if(uploadfile && config->resume_from_current)
|
|
|
|
config->resume_from = -1; /* -1 will then force get-it-yourself */
|
|
|
|
|
2014-03-01 08:20:20 -05:00
|
|
|
if(output_expected(this_url, uploadfile) && outs.stream &&
|
|
|
|
isatty(fileno(outs.stream)))
|
2011-10-04 18:03:20 -04:00
|
|
|
/* we send the output to a tty, therefore we switch off the progress
|
|
|
|
meter */
|
2014-03-01 08:49:28 -05:00
|
|
|
global->noprogress = global->isatty = TRUE;
|
2012-06-20 12:00:53 -04:00
|
|
|
else {
|
|
|
|
/* progress meter is per download, so restore config
|
|
|
|
values */
|
2014-03-01 08:20:20 -05:00
|
|
|
global->noprogress = orig_noprogress;
|
2014-03-01 08:49:28 -05:00
|
|
|
global->isatty = orig_isatty;
|
2012-06-20 12:00:53 -04:00
|
|
|
}
|
2011-10-04 18:03:20 -04:00
|
|
|
|
2014-02-27 15:21:23 -05:00
|
|
|
if(urlnum > 1 && !global->mute) {
|
2014-03-01 08:00:31 -05:00
|
|
|
fprintf(global->errors, "\n[%lu/%lu]: %s --> %s\n",
|
2017-09-09 17:55:08 -04:00
|
|
|
li + 1, urlnum, this_url, outfile ? outfile : "<stdout>");
|
2011-10-04 18:03:20 -04:00
|
|
|
if(separator)
|
|
|
|
printf("%s%s\n", CURLseparator, this_url);
|
|
|
|
}
|
|
|
|
if(httpgetfields) {
|
|
|
|
char *urlbuffer;
|
|
|
|
/* Find out whether the url contains a file name */
|
|
|
|
const char *pc = strstr(this_url, "://");
|
|
|
|
char sep = '?';
|
|
|
|
if(pc)
|
|
|
|
pc += 3;
|
|
|
|
else
|
|
|
|
pc = this_url;
|
|
|
|
|
|
|
|
pc = strrchr(pc, '/'); /* check for a slash */
|
|
|
|
|
|
|
|
if(pc) {
|
|
|
|
/* there is a slash present in the URL */
|
|
|
|
|
|
|
|
if(strchr(pc, '?'))
|
|
|
|
/* Ouch, there's already a question mark in the URL string, we
|
|
|
|
then append the data with an ampersand separator instead! */
|
2017-09-09 17:09:06 -04:00
|
|
|
sep = '&';
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Then append ? followed by the get fields to the url.
|
|
|
|
*/
|
|
|
|
if(pc)
|
2013-03-06 07:27:51 -05:00
|
|
|
urlbuffer = aprintf("%s%c%s", this_url, sep, httpgetfields);
|
2011-10-04 18:03:20 -04:00
|
|
|
else
|
|
|
|
/* Append / before the ? to create a well-formed url
|
|
|
|
if the url contains a hostname only
|
|
|
|
*/
|
2013-03-06 07:27:51 -05:00
|
|
|
urlbuffer = aprintf("%s/?%s", this_url, httpgetfields);
|
|
|
|
|
|
|
|
if(!urlbuffer) {
|
2014-12-16 02:35:47 -05:00
|
|
|
result = CURLE_OUT_OF_MEMORY;
|
2013-03-06 07:27:51 -05:00
|
|
|
goto show_error;
|
|
|
|
}
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
Curl_safefree(this_url); /* free previous URL */
|
|
|
|
this_url = urlbuffer; /* use our new URL instead! */
|
|
|
|
}
|
|
|
|
|
2014-03-01 08:00:31 -05:00
|
|
|
if(!global->errors)
|
|
|
|
global->errors = stderr;
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
if((!outfile || !strcmp(outfile, "-")) && !config->use_ascii) {
|
|
|
|
/* We get the output to stdout and we have not got the ASCII/text
|
|
|
|
flag, then set stdout to be binary */
|
|
|
|
set_binmode(stdout);
|
|
|
|
}
|
|
|
|
|
2017-06-16 05:30:36 -04:00
|
|
|
/* explicitly passed to stdout means okaying binary gunk */
|
|
|
|
config->terminal_binary_ok = (outfile && !strcmp(outfile, "-"));
|
|
|
|
|
2016-06-30 08:56:02 -04:00
|
|
|
if(!config->tcp_nodelay)
|
|
|
|
my_setopt(curl, CURLOPT_TCP_NODELAY, 0L);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
2016-02-16 07:21:34 -05:00
|
|
|
if(config->tcp_fastopen)
|
|
|
|
my_setopt(curl, CURLOPT_TCP_FASTOPEN, 1L);
|
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
/* where to store */
|
|
|
|
my_setopt(curl, CURLOPT_WRITEDATA, &outs);
|
2019-05-14 04:03:54 -04:00
|
|
|
#ifndef CURL_DISABLE_RTSP
|
2017-12-10 17:58:28 -05:00
|
|
|
my_setopt(curl, CURLOPT_INTERLEAVEDATA, &outs);
|
2019-05-14 04:03:54 -04:00
|
|
|
#endif
|
2012-06-20 11:51:06 -04:00
|
|
|
if(metalink || !config->use_metalink)
|
|
|
|
/* what call to write */
|
|
|
|
my_setopt(curl, CURLOPT_WRITEFUNCTION, tool_write_cb);
|
|
|
|
#ifdef USE_METALINK
|
|
|
|
else
|
|
|
|
/* Set Metalink specific write callback function to parse
|
|
|
|
XML data progressively. */
|
|
|
|
my_setopt(curl, CURLOPT_WRITEFUNCTION, metalink_write_cb);
|
|
|
|
#endif /* USE_METALINK */
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
/* for uploads */
|
|
|
|
input.fd = infd;
|
|
|
|
input.config = config;
|
2012-01-04 06:24:49 -05:00
|
|
|
/* Note that if CURLOPT_READFUNCTION is fread (the default), then
|
2013-01-03 20:50:28 -05:00
|
|
|
* lib/telnet.c will Curl_poll() on the input file descriptor
|
2012-01-04 06:24:49 -05:00
|
|
|
* rather then calling the READFUNCTION at regular intervals.
|
|
|
|
* The circumstances in which it is preferable to enable this
|
|
|
|
* behaviour, by omitting to set the READFUNCTION & READDATA options,
|
|
|
|
* have not been determined.
|
|
|
|
*/
|
2011-10-04 18:03:20 -04:00
|
|
|
my_setopt(curl, CURLOPT_READDATA, &input);
|
|
|
|
/* what call to read */
|
2012-01-04 06:24:49 -05:00
|
|
|
my_setopt(curl, CURLOPT_READFUNCTION, tool_read_cb);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
/* in 7.18.0, the CURLOPT_SEEKFUNCTION/DATA pair is taking over what
|
|
|
|
CURLOPT_IOCTLFUNCTION/DATA pair previously provided for seeking */
|
|
|
|
my_setopt(curl, CURLOPT_SEEKDATA, &input);
|
|
|
|
my_setopt(curl, CURLOPT_SEEKFUNCTION, tool_seek_cb);
|
|
|
|
|
2017-04-24 06:03:08 -04:00
|
|
|
if(config->recvpersecond &&
|
|
|
|
(config->recvpersecond < BUFFER_SIZE))
|
|
|
|
/* use a smaller sized buffer for better sleeps */
|
2013-07-22 12:08:23 -04:00
|
|
|
my_setopt(curl, CURLOPT_BUFFERSIZE, (long)config->recvpersecond);
|
2017-04-24 06:03:08 -04:00
|
|
|
else
|
|
|
|
my_setopt(curl, CURLOPT_BUFFERSIZE, (long)BUFFER_SIZE);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
/* size of uploaded file: */
|
|
|
|
if(uploadfilesize != -1)
|
|
|
|
my_setopt(curl, CURLOPT_INFILESIZE_LARGE, uploadfilesize);
|
|
|
|
my_setopt_str(curl, CURLOPT_URL, this_url); /* what to fetch */
|
2014-03-01 08:20:20 -05:00
|
|
|
my_setopt(curl, CURLOPT_NOPROGRESS, global->noprogress?1L:0L);
|
2018-05-17 07:56:35 -04:00
|
|
|
if(config->no_body)
|
2013-07-22 12:08:23 -04:00
|
|
|
my_setopt(curl, CURLOPT_NOBODY, 1L);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
2015-09-04 02:11:09 -04:00
|
|
|
if(config->oauth_bearer)
|
|
|
|
my_setopt_str(curl, CURLOPT_XOAUTH2_BEARER, config->oauth_bearer);
|
2013-08-25 13:18:59 -04:00
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
#if !defined(CURL_DISABLE_PROXY)
|
|
|
|
{
|
|
|
|
my_setopt_str(curl, CURLOPT_PROXY, config->proxy);
|
2016-12-16 09:34:14 -05:00
|
|
|
/* new in libcurl 7.5 */
|
|
|
|
if(config->proxy)
|
|
|
|
my_setopt_enum(curl, CURLOPT_PROXYTYPE, config->proxyver);
|
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
my_setopt_str(curl, CURLOPT_PROXYUSERPWD, config->proxyuserpwd);
|
|
|
|
|
|
|
|
/* new in libcurl 7.3 */
|
2013-07-22 12:08:23 -04:00
|
|
|
my_setopt(curl, CURLOPT_HTTPPROXYTUNNEL, config->proxytunnel?1L:0L);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
2016-12-16 09:10:19 -05:00
|
|
|
/* new in libcurl 7.52.0 */
|
2016-12-16 10:02:08 -05:00
|
|
|
if(config->preproxy)
|
|
|
|
my_setopt_str(curl, CURLOPT_PRE_PROXY, config->preproxy);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
/* new in libcurl 7.10.6 */
|
|
|
|
if(config->proxyanyauth)
|
2012-04-19 10:31:11 -04:00
|
|
|
my_setopt_bitmask(curl, CURLOPT_PROXYAUTH,
|
2013-07-22 12:08:23 -04:00
|
|
|
(long)CURLAUTH_ANY);
|
2011-10-04 18:03:20 -04:00
|
|
|
else if(config->proxynegotiate)
|
2012-04-19 10:31:11 -04:00
|
|
|
my_setopt_bitmask(curl, CURLOPT_PROXYAUTH,
|
2013-07-22 12:08:23 -04:00
|
|
|
(long)CURLAUTH_GSSNEGOTIATE);
|
2011-10-04 18:03:20 -04:00
|
|
|
else if(config->proxyntlm)
|
2012-04-19 10:31:11 -04:00
|
|
|
my_setopt_bitmask(curl, CURLOPT_PROXYAUTH,
|
2013-07-22 12:08:23 -04:00
|
|
|
(long)CURLAUTH_NTLM);
|
2011-10-04 18:03:20 -04:00
|
|
|
else if(config->proxydigest)
|
2012-04-19 10:31:11 -04:00
|
|
|
my_setopt_bitmask(curl, CURLOPT_PROXYAUTH,
|
2013-07-22 12:08:23 -04:00
|
|
|
(long)CURLAUTH_DIGEST);
|
2011-10-04 18:03:20 -04:00
|
|
|
else if(config->proxybasic)
|
2012-04-19 10:31:11 -04:00
|
|
|
my_setopt_bitmask(curl, CURLOPT_PROXYAUTH,
|
2013-07-22 12:08:23 -04:00
|
|
|
(long)CURLAUTH_BASIC);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
/* new in libcurl 7.19.4 */
|
2015-11-13 10:59:09 -05:00
|
|
|
my_setopt_str(curl, CURLOPT_NOPROXY, config->noproxy);
|
2016-04-28 05:33:25 -04:00
|
|
|
|
|
|
|
my_setopt(curl, CURLOPT_SUPPRESS_CONNECT_HEADERS,
|
|
|
|
config->suppress_connect_headers?1L:0L);
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
2016-04-28 05:33:25 -04:00
|
|
|
#endif /* !CURL_DISABLE_PROXY */
|
2011-10-04 18:03:20 -04:00
|
|
|
|
2013-07-22 12:08:23 -04:00
|
|
|
my_setopt(curl, CURLOPT_FAILONERROR, config->failonerror?1L:0L);
|
2017-06-21 17:35:08 -04:00
|
|
|
my_setopt(curl, CURLOPT_REQUEST_TARGET, config->request_target);
|
2013-07-22 12:08:23 -04:00
|
|
|
my_setopt(curl, CURLOPT_UPLOAD, uploadfile?1L:0L);
|
|
|
|
my_setopt(curl, CURLOPT_DIRLISTONLY, config->dirlistonly?1L:0L);
|
|
|
|
my_setopt(curl, CURLOPT_APPEND, config->ftp_append?1L:0L);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
if(config->netrc_opt)
|
2013-07-22 14:03:27 -04:00
|
|
|
my_setopt_enum(curl, CURLOPT_NETRC, (long)CURL_NETRC_OPTIONAL);
|
2011-10-04 18:03:20 -04:00
|
|
|
else if(config->netrc || config->netrc_file)
|
2013-07-22 14:03:27 -04:00
|
|
|
my_setopt_enum(curl, CURLOPT_NETRC, (long)CURL_NETRC_REQUIRED);
|
2011-10-04 18:03:20 -04:00
|
|
|
else
|
2013-07-22 14:03:27 -04:00
|
|
|
my_setopt_enum(curl, CURLOPT_NETRC, (long)CURL_NETRC_IGNORED);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
if(config->netrc_file)
|
2015-11-13 10:59:09 -05:00
|
|
|
my_setopt_str(curl, CURLOPT_NETRC_FILE, config->netrc_file);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
2013-07-22 12:08:23 -04:00
|
|
|
my_setopt(curl, CURLOPT_TRANSFERTEXT, config->use_ascii?1L:0L);
|
2013-12-14 16:39:27 -05:00
|
|
|
if(config->login_options)
|
|
|
|
my_setopt_str(curl, CURLOPT_LOGIN_OPTIONS, config->login_options);
|
2011-10-04 18:03:20 -04:00
|
|
|
my_setopt_str(curl, CURLOPT_USERPWD, config->userpwd);
|
|
|
|
my_setopt_str(curl, CURLOPT_RANGE, config->range);
|
|
|
|
my_setopt(curl, CURLOPT_ERRORBUFFER, errorbuffer);
|
2013-04-30 10:23:39 -04:00
|
|
|
my_setopt(curl, CURLOPT_TIMEOUT_MS, (long)(config->timeout * 1000));
|
2011-10-04 18:03:20 -04:00
|
|
|
|
2017-09-29 19:20:56 -04:00
|
|
|
switch(config->httpreq) {
|
|
|
|
case HTTPREQ_SIMPLEPOST:
|
|
|
|
my_setopt_str(curl, CURLOPT_POSTFIELDS,
|
|
|
|
config->postfields);
|
|
|
|
my_setopt(curl, CURLOPT_POSTFIELDSIZE_LARGE,
|
|
|
|
config->postfieldsize);
|
|
|
|
break;
|
|
|
|
case HTTPREQ_MIMEPOST:
|
2019-02-19 11:08:58 -05:00
|
|
|
result = tool2curlmime(curl, config->mimeroot, &config->mimepost);
|
|
|
|
if(result)
|
|
|
|
goto show_error;
|
2017-09-29 19:20:56 -04:00
|
|
|
my_setopt_mimepost(curl, CURLOPT_MIMEPOST, config->mimepost);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* new in libcurl 7.10.6 (default is Basic) */
|
|
|
|
if(config->authtype)
|
|
|
|
my_setopt_bitmask(curl, CURLOPT_HTTPAUTH, (long)config->authtype);
|
|
|
|
|
|
|
|
my_setopt_slist(curl, CURLOPT_HTTPHEADER, config->headers);
|
|
|
|
|
|
|
|
if(built_in_protos & (CURLPROTO_HTTP | CURLPROTO_RTSP)) {
|
|
|
|
my_setopt_str(curl, CURLOPT_REFERER, config->referer);
|
|
|
|
my_setopt_str(curl, CURLOPT_USERAGENT, config->useragent);
|
|
|
|
}
|
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
if(built_in_protos & CURLPROTO_HTTP) {
|
|
|
|
|
2012-04-12 14:41:03 -04:00
|
|
|
long postRedir = 0;
|
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
my_setopt(curl, CURLOPT_FOLLOWLOCATION,
|
2013-07-22 12:08:23 -04:00
|
|
|
config->followlocation?1L:0L);
|
2011-10-04 18:03:20 -04:00
|
|
|
my_setopt(curl, CURLOPT_UNRESTRICTED_AUTH,
|
2013-07-22 12:08:23 -04:00
|
|
|
config->unrestricted_auth?1L:0L);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
2013-07-22 12:08:23 -04:00
|
|
|
my_setopt(curl, CURLOPT_AUTOREFERER, config->autoreferer?1L:0L);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
2014-02-04 17:48:16 -05:00
|
|
|
/* new in libcurl 7.36.0 */
|
|
|
|
if(config->proxyheaders) {
|
|
|
|
my_setopt_slist(curl, CURLOPT_PROXYHEADER, config->proxyheaders);
|
|
|
|
my_setopt(curl, CURLOPT_HEADEROPT, CURLHEADER_SEPARATE);
|
|
|
|
}
|
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
/* new in libcurl 7.5 */
|
|
|
|
my_setopt(curl, CURLOPT_MAXREDIRS, config->maxredirs);
|
|
|
|
|
|
|
|
if(config->httpversion)
|
2012-02-23 04:43:37 -05:00
|
|
|
my_setopt_enum(curl, CURLOPT_HTTP_VERSION, config->httpversion);
|
2015-12-13 03:24:08 -05:00
|
|
|
else if(curlinfo->features & CURL_VERSION_HTTP2) {
|
|
|
|
my_setopt_enum(curl, CURLOPT_HTTP_VERSION, CURL_HTTP_VERSION_2TLS);
|
|
|
|
}
|
2011-10-04 18:03:20 -04:00
|
|
|
|
2012-04-05 17:34:12 -04:00
|
|
|
/* curl 7.19.1 (the 301 version existed in 7.18.2),
|
|
|
|
303 was added in 7.26.0 */
|
2012-04-12 14:41:03 -04:00
|
|
|
if(config->post301)
|
|
|
|
postRedir |= CURL_REDIR_POST_301;
|
|
|
|
if(config->post302)
|
|
|
|
postRedir |= CURL_REDIR_POST_302;
|
|
|
|
if(config->post303)
|
|
|
|
postRedir |= CURL_REDIR_POST_303;
|
|
|
|
my_setopt(curl, CURLOPT_POSTREDIR, postRedir);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
/* new in libcurl 7.21.6 */
|
|
|
|
if(config->encoding)
|
|
|
|
my_setopt_str(curl, CURLOPT_ACCEPT_ENCODING, "");
|
|
|
|
|
|
|
|
/* new in libcurl 7.21.6 */
|
|
|
|
if(config->tr_encoding)
|
2013-07-22 12:08:23 -04:00
|
|
|
my_setopt(curl, CURLOPT_TRANSFER_ENCODING, 1L);
|
2018-12-17 09:46:56 -05:00
|
|
|
/* new in libcurl 7.64.0 */
|
2019-02-06 08:59:15 -05:00
|
|
|
my_setopt(curl, CURLOPT_HTTP09_ALLOWED,
|
|
|
|
config->http09_allowed ? 1L : 0L);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
} /* (built_in_protos & CURLPROTO_HTTP) */
|
|
|
|
|
2019-05-15 02:42:57 -04:00
|
|
|
#ifndef CURL_DISABLE_FTP
|
2011-10-04 18:03:20 -04:00
|
|
|
my_setopt_str(curl, CURLOPT_FTPPORT, config->ftpport);
|
2019-05-15 02:42:57 -04:00
|
|
|
#endif
|
2011-10-04 18:03:20 -04:00
|
|
|
my_setopt(curl, CURLOPT_LOW_SPEED_LIMIT,
|
|
|
|
config->low_speed_limit);
|
|
|
|
my_setopt(curl, CURLOPT_LOW_SPEED_TIME, config->low_speed_time);
|
|
|
|
my_setopt(curl, CURLOPT_MAX_SEND_SPEED_LARGE,
|
|
|
|
config->sendpersecond);
|
|
|
|
my_setopt(curl, CURLOPT_MAX_RECV_SPEED_LARGE,
|
|
|
|
config->recvpersecond);
|
|
|
|
|
2013-07-22 12:08:23 -04:00
|
|
|
if(config->use_resume)
|
|
|
|
my_setopt(curl, CURLOPT_RESUME_FROM_LARGE, config->resume_from);
|
|
|
|
else
|
|
|
|
my_setopt(curl, CURLOPT_RESUME_FROM_LARGE, CURL_OFF_T_C(0));
|
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
my_setopt_str(curl, CURLOPT_KEYPASSWD, config->key_passwd);
|
2019-05-14 04:03:54 -04:00
|
|
|
#ifndef CURL_DISABLE_PROXY
|
2016-11-16 12:49:15 -05:00
|
|
|
my_setopt_str(curl, CURLOPT_PROXY_KEYPASSWD, config->proxy_key_passwd);
|
2019-05-14 04:03:54 -04:00
|
|
|
#endif
|
2011-10-04 18:03:20 -04:00
|
|
|
if(built_in_protos & (CURLPROTO_SCP|CURLPROTO_SFTP)) {
|
|
|
|
|
|
|
|
/* SSH and SSL private key uses same command-line option */
|
|
|
|
/* new in libcurl 7.16.1 */
|
|
|
|
my_setopt_str(curl, CURLOPT_SSH_PRIVATE_KEYFILE, config->key);
|
|
|
|
/* new in libcurl 7.16.1 */
|
|
|
|
my_setopt_str(curl, CURLOPT_SSH_PUBLIC_KEYFILE, config->pubkey);
|
|
|
|
|
|
|
|
/* new in libcurl 7.17.1: SSH host key md5 checking allows us
|
|
|
|
to fail if we are not talking to who we think we should */
|
|
|
|
my_setopt_str(curl, CURLOPT_SSH_HOST_PUBLIC_KEY_MD5,
|
|
|
|
config->hostpubmd5);
|
2017-08-05 05:26:04 -04:00
|
|
|
|
|
|
|
/* new in libcurl 7.56.0 */
|
|
|
|
if(config->ssh_compression)
|
|
|
|
my_setopt(curl, CURLOPT_SSH_COMPRESSION, 1L);
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if(config->cacert)
|
|
|
|
my_setopt_str(curl, CURLOPT_CAINFO, config->cacert);
|
2016-11-16 12:49:15 -05:00
|
|
|
if(config->proxy_cacert)
|
|
|
|
my_setopt_str(curl, CURLOPT_PROXY_CAINFO, config->proxy_cacert);
|
2017-02-21 22:21:17 -05:00
|
|
|
|
2016-03-28 14:28:23 -04:00
|
|
|
if(config->capath) {
|
|
|
|
result = res_setopt_str(curl, CURLOPT_CAPATH, config->capath);
|
|
|
|
if(result == CURLE_NOT_BUILT_IN) {
|
|
|
|
warnf(config->global, "ignoring %s, not supported by libcurl\n",
|
|
|
|
capath_from_env?
|
|
|
|
"SSL_CERT_DIR environment variable":"--capath");
|
|
|
|
}
|
|
|
|
else if(result)
|
|
|
|
goto show_error;
|
|
|
|
}
|
2017-02-21 22:21:17 -05:00
|
|
|
/* For the time being if --proxy-capath is not set then we use the
|
|
|
|
--capath value for it, if any. See #1257 */
|
|
|
|
if(config->proxy_capath || config->capath) {
|
|
|
|
result = res_setopt_str(curl, CURLOPT_PROXY_CAPATH,
|
|
|
|
(config->proxy_capath ?
|
|
|
|
config->proxy_capath :
|
|
|
|
config->capath));
|
|
|
|
if(result == CURLE_NOT_BUILT_IN) {
|
|
|
|
if(config->proxy_capath) {
|
|
|
|
warnf(config->global,
|
|
|
|
"ignoring --proxy-capath, not supported by libcurl\n");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else if(result)
|
|
|
|
goto show_error;
|
|
|
|
}
|
2016-11-16 12:49:15 -05:00
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
if(config->crlfile)
|
|
|
|
my_setopt_str(curl, CURLOPT_CRLFILE, config->crlfile);
|
2016-11-16 12:49:15 -05:00
|
|
|
if(config->proxy_crlfile)
|
|
|
|
my_setopt_str(curl, CURLOPT_PROXY_CRLFILE, config->proxy_crlfile);
|
|
|
|
else if(config->crlfile) /* CURLOPT_PROXY_CRLFILE default is crlfile */
|
|
|
|
my_setopt_str(curl, CURLOPT_PROXY_CRLFILE, config->crlfile);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
2014-09-30 22:31:17 -04:00
|
|
|
if(config->pinnedpubkey)
|
|
|
|
my_setopt_str(curl, CURLOPT_PINNEDPUBLICKEY, config->pinnedpubkey);
|
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
if(curlinfo->features & CURL_VERSION_SSL) {
|
2018-02-19 08:31:06 -05:00
|
|
|
/* Check if config->cert is a PKCS#11 URI and set the
|
|
|
|
* config->cert_type if necessary */
|
|
|
|
if(config->cert) {
|
|
|
|
if(!config->cert_type) {
|
|
|
|
if(is_pkcs11_uri(config->cert)) {
|
|
|
|
config->cert_type = strdup("ENG");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check if config->key is a PKCS#11 URI and set the
|
|
|
|
* config->key_type if necessary */
|
|
|
|
if(config->key) {
|
|
|
|
if(!config->key_type) {
|
|
|
|
if(is_pkcs11_uri(config->key)) {
|
|
|
|
config->key_type = strdup("ENG");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check if config->proxy_cert is a PKCS#11 URI and set the
|
|
|
|
* config->proxy_type if necessary */
|
|
|
|
if(config->proxy_cert) {
|
|
|
|
if(!config->proxy_cert_type) {
|
|
|
|
if(is_pkcs11_uri(config->proxy_cert)) {
|
|
|
|
config->proxy_cert_type = strdup("ENG");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check if config->proxy_key is a PKCS#11 URI and set the
|
|
|
|
* config->proxy_key_type if necessary */
|
|
|
|
if(config->proxy_key) {
|
|
|
|
if(!config->proxy_key_type) {
|
|
|
|
if(is_pkcs11_uri(config->proxy_key)) {
|
|
|
|
config->proxy_key_type = strdup("ENG");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-03-28 06:51:05 -04:00
|
|
|
my_setopt_str(curl, CURLOPT_SSLCERT, config->cert);
|
2016-11-16 12:49:15 -05:00
|
|
|
my_setopt_str(curl, CURLOPT_PROXY_SSLCERT, config->proxy_cert);
|
2015-03-28 06:51:05 -04:00
|
|
|
my_setopt_str(curl, CURLOPT_SSLCERTTYPE, config->cert_type);
|
2016-11-16 12:49:15 -05:00
|
|
|
my_setopt_str(curl, CURLOPT_PROXY_SSLCERTTYPE,
|
|
|
|
config->proxy_cert_type);
|
2015-03-28 06:51:05 -04:00
|
|
|
my_setopt_str(curl, CURLOPT_SSLKEY, config->key);
|
2016-11-16 12:49:15 -05:00
|
|
|
my_setopt_str(curl, CURLOPT_PROXY_SSLKEY, config->proxy_key);
|
2015-03-28 06:51:05 -04:00
|
|
|
my_setopt_str(curl, CURLOPT_SSLKEYTYPE, config->key_type);
|
2016-11-16 12:49:15 -05:00
|
|
|
my_setopt_str(curl, CURLOPT_PROXY_SSLKEYTYPE,
|
|
|
|
config->proxy_key_type);
|
2015-03-28 06:51:05 -04:00
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
if(config->insecure_ok) {
|
|
|
|
my_setopt(curl, CURLOPT_SSL_VERIFYPEER, 0L);
|
2012-11-06 16:27:25 -05:00
|
|
|
my_setopt(curl, CURLOPT_SSL_VERIFYHOST, 0L);
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
my_setopt(curl, CURLOPT_SSL_VERIFYPEER, 1L);
|
|
|
|
/* libcurl default is strict verifyhost -> 2L */
|
|
|
|
/* my_setopt(curl, CURLOPT_SSL_VERIFYHOST, 2L); */
|
|
|
|
}
|
2016-11-16 12:49:15 -05:00
|
|
|
if(config->proxy_insecure_ok) {
|
|
|
|
my_setopt(curl, CURLOPT_PROXY_SSL_VERIFYPEER, 0L);
|
|
|
|
my_setopt(curl, CURLOPT_PROXY_SSL_VERIFYHOST, 0L);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
my_setopt(curl, CURLOPT_PROXY_SSL_VERIFYPEER, 1L);
|
|
|
|
}
|
2014-06-16 14:47:26 -04:00
|
|
|
|
|
|
|
if(config->verifystatus)
|
|
|
|
my_setopt(curl, CURLOPT_SSL_VERIFYSTATUS, 1L);
|
2015-02-14 12:17:04 -05:00
|
|
|
|
|
|
|
if(config->falsestart)
|
|
|
|
my_setopt(curl, CURLOPT_SSL_FALSESTART, 1L);
|
2015-03-28 06:51:05 -04:00
|
|
|
|
2016-12-13 15:10:00 -05:00
|
|
|
my_setopt_enum(curl, CURLOPT_SSLVERSION,
|
|
|
|
config->ssl_version | config->ssl_version_max);
|
2016-11-16 12:49:15 -05:00
|
|
|
my_setopt_enum(curl, CURLOPT_PROXY_SSLVERSION,
|
|
|
|
config->proxy_ssl_version);
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
2015-03-23 05:51:49 -04:00
|
|
|
if(config->path_as_is)
|
|
|
|
my_setopt(curl, CURLOPT_PATH_AS_IS, 1L);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
if(built_in_protos & (CURLPROTO_SCP|CURLPROTO_SFTP)) {
|
|
|
|
if(!config->insecure_ok) {
|
|
|
|
char *home;
|
|
|
|
char *file;
|
2014-12-16 02:35:47 -05:00
|
|
|
result = CURLE_OUT_OF_MEMORY;
|
2011-10-04 18:03:20 -04:00
|
|
|
home = homedir();
|
|
|
|
if(home) {
|
|
|
|
file = aprintf("%s/%sssh/known_hosts", home, DOT_CHAR);
|
|
|
|
if(file) {
|
|
|
|
/* new in curl 7.19.6 */
|
2014-12-16 02:35:47 -05:00
|
|
|
result = res_setopt_str(curl, CURLOPT_SSH_KNOWNHOSTS, file);
|
2011-10-04 18:03:20 -04:00
|
|
|
curl_free(file);
|
2014-12-16 02:35:47 -05:00
|
|
|
if(result == CURLE_UNKNOWN_OPTION)
|
2011-10-04 18:03:20 -04:00
|
|
|
/* libssh2 version older than 1.1.1 */
|
2014-12-16 02:35:47 -05:00
|
|
|
result = CURLE_OK;
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
2011-10-07 14:50:57 -04:00
|
|
|
Curl_safefree(home);
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
2014-12-16 02:35:47 -05:00
|
|
|
if(result)
|
2011-10-04 18:03:20 -04:00
|
|
|
goto show_error;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if(config->no_body || config->remote_time) {
|
|
|
|
/* no body or use remote time */
|
2013-07-22 12:08:23 -04:00
|
|
|
my_setopt(curl, CURLOPT_FILETIME, 1L);
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
|
2013-07-22 12:08:23 -04:00
|
|
|
my_setopt(curl, CURLOPT_CRLF, config->crlf?1L:0L);
|
2012-02-23 04:43:37 -05:00
|
|
|
my_setopt_slist(curl, CURLOPT_QUOTE, config->quote);
|
|
|
|
my_setopt_slist(curl, CURLOPT_POSTQUOTE, config->postquote);
|
|
|
|
my_setopt_slist(curl, CURLOPT_PREQUOTE, config->prequote);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
#if !defined(CURL_DISABLE_HTTP) && !defined(CURL_DISABLE_COOKIES)
|
2014-05-05 08:16:43 -04:00
|
|
|
if(config->cookie)
|
|
|
|
my_setopt_str(curl, CURLOPT_COOKIE, config->cookie);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
2014-05-05 08:16:43 -04:00
|
|
|
if(config->cookiefile)
|
|
|
|
my_setopt_str(curl, CURLOPT_COOKIEFILE, config->cookiefile);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
2014-05-05 08:16:43 -04:00
|
|
|
/* new in libcurl 7.9 */
|
|
|
|
if(config->cookiejar)
|
|
|
|
my_setopt_str(curl, CURLOPT_COOKIEJAR, config->cookiejar);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
2014-05-05 08:16:43 -04:00
|
|
|
/* new in libcurl 7.9.7 */
|
|
|
|
my_setopt(curl, CURLOPT_COOKIESESSION, config->cookiesession?1L:0L);
|
|
|
|
#else
|
|
|
|
if(config->cookie || config->cookiefile || config->cookiejar) {
|
2015-02-27 15:48:38 -05:00
|
|
|
warnf(config->global, "cookie option(s) used even though cookie "
|
|
|
|
"support is disabled!\n");
|
2014-05-05 08:16:43 -04:00
|
|
|
return CURLE_NOT_BUILT_IN;
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2013-07-22 12:08:23 -04:00
|
|
|
my_setopt_enum(curl, CURLOPT_TIMECONDITION, (long)config->timecond);
|
2018-02-05 15:57:39 -05:00
|
|
|
my_setopt(curl, CURLOPT_TIMEVALUE_LARGE, config->condtime);
|
2011-10-04 18:03:20 -04:00
|
|
|
my_setopt_str(curl, CURLOPT_CUSTOMREQUEST, config->customrequest);
|
2015-08-29 17:56:28 -04:00
|
|
|
customrequest_helper(config, config->httpreq, config->customrequest);
|
2014-03-01 08:00:31 -05:00
|
|
|
my_setopt(curl, CURLOPT_STDERR, global->errors);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
/* three new ones in libcurl 7.3: */
|
|
|
|
my_setopt_str(curl, CURLOPT_INTERFACE, config->iface);
|
2019-05-14 04:03:54 -04:00
|
|
|
#ifndef CURL_DISABLE_FTP
|
2011-10-04 18:03:20 -04:00
|
|
|
my_setopt_str(curl, CURLOPT_KRBLEVEL, config->krblevel);
|
2019-05-14 04:03:54 -04:00
|
|
|
#endif
|
2011-10-04 18:03:20 -04:00
|
|
|
progressbarinit(&progressbar, config);
|
2014-03-01 08:20:20 -05:00
|
|
|
if((global->progressmode == CURL_PROGRESS_BAR) &&
|
|
|
|
!global->noprogress && !global->mute) {
|
2011-10-04 18:03:20 -04:00
|
|
|
/* we want the alternative style, then we have to implement it
|
|
|
|
ourselves! */
|
2013-10-13 13:39:41 -04:00
|
|
|
my_setopt(curl, CURLOPT_XFERINFOFUNCTION, tool_progress_cb);
|
|
|
|
my_setopt(curl, CURLOPT_XFERINFODATA, &progressbar);
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
|
2013-09-13 13:50:11 -04:00
|
|
|
/* new in libcurl 7.24.0: */
|
|
|
|
if(config->dns_servers)
|
|
|
|
my_setopt_str(curl, CURLOPT_DNS_SERVERS, config->dns_servers);
|
|
|
|
|
2013-02-09 16:18:02 -05:00
|
|
|
/* new in libcurl 7.33.0: */
|
2013-09-13 13:50:11 -04:00
|
|
|
if(config->dns_interface)
|
|
|
|
my_setopt_str(curl, CURLOPT_DNS_INTERFACE, config->dns_interface);
|
|
|
|
if(config->dns_ipv4_addr)
|
|
|
|
my_setopt_str(curl, CURLOPT_DNS_LOCAL_IP4, config->dns_ipv4_addr);
|
|
|
|
if(config->dns_ipv6_addr)
|
2013-02-09 16:18:02 -05:00
|
|
|
my_setopt_str(curl, CURLOPT_DNS_LOCAL_IP6, config->dns_ipv6_addr);
|
|
|
|
|
2019-05-14 04:03:54 -04:00
|
|
|
#ifndef CURL_DISABLE_TELNET
|
2011-10-04 18:03:20 -04:00
|
|
|
/* new in libcurl 7.6.2: */
|
2012-02-23 04:43:37 -05:00
|
|
|
my_setopt_slist(curl, CURLOPT_TELNETOPTIONS, config->telnet_options);
|
2019-05-14 04:03:54 -04:00
|
|
|
#endif
|
2011-10-04 18:03:20 -04:00
|
|
|
/* new in libcurl 7.7: */
|
|
|
|
my_setopt_str(curl, CURLOPT_RANDOM_FILE, config->random_file);
|
2013-07-22 12:08:23 -04:00
|
|
|
my_setopt_str(curl, CURLOPT_EGDSOCKET, config->egd_file);
|
2013-04-30 10:23:39 -04:00
|
|
|
my_setopt(curl, CURLOPT_CONNECTTIMEOUT_MS,
|
|
|
|
(long)(config->connecttimeout * 1000));
|
2011-10-04 18:03:20 -04:00
|
|
|
|
2018-09-06 03:16:02 -04:00
|
|
|
if(config->doh_url)
|
|
|
|
my_setopt_str(curl, CURLOPT_DOH_URL, config->doh_url);
|
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
if(config->cipher_list)
|
|
|
|
my_setopt_str(curl, CURLOPT_SSL_CIPHER_LIST, config->cipher_list);
|
|
|
|
|
2016-11-16 12:49:15 -05:00
|
|
|
if(config->proxy_cipher_list)
|
|
|
|
my_setopt_str(curl, CURLOPT_PROXY_SSL_CIPHER_LIST,
|
|
|
|
config->proxy_cipher_list);
|
|
|
|
|
2018-05-29 10:12:52 -04:00
|
|
|
if(config->cipher13_list)
|
|
|
|
my_setopt_str(curl, CURLOPT_TLS13_CIPHERS, config->cipher13_list);
|
|
|
|
|
|
|
|
if(config->proxy_cipher13_list)
|
2018-08-31 19:40:55 -04:00
|
|
|
my_setopt_str(curl, CURLOPT_PROXY_TLS13_CIPHERS,
|
2018-05-29 10:12:52 -04:00
|
|
|
config->proxy_cipher13_list);
|
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
/* new in libcurl 7.9.2: */
|
|
|
|
if(config->disable_epsv)
|
|
|
|
/* disable it */
|
2013-07-22 12:08:23 -04:00
|
|
|
my_setopt(curl, CURLOPT_FTP_USE_EPSV, 0L);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
/* new in libcurl 7.10.5 */
|
|
|
|
if(config->disable_eprt)
|
|
|
|
/* disable it */
|
2013-07-22 12:08:23 -04:00
|
|
|
my_setopt(curl, CURLOPT_FTP_USE_EPRT, 0L);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
2014-02-27 15:51:49 -05:00
|
|
|
if(global->tracetype != TRACE_NONE) {
|
2011-10-04 18:03:20 -04:00
|
|
|
my_setopt(curl, CURLOPT_DEBUGFUNCTION, tool_debug_cb);
|
|
|
|
my_setopt(curl, CURLOPT_DEBUGDATA, config);
|
2013-07-22 12:08:23 -04:00
|
|
|
my_setopt(curl, CURLOPT_VERBOSE, 1L);
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
/* new in curl 7.9.3 */
|
|
|
|
if(config->engine) {
|
2014-12-16 02:35:47 -05:00
|
|
|
result = res_setopt_str(curl, CURLOPT_SSLENGINE, config->engine);
|
|
|
|
if(result)
|
2011-10-04 18:03:20 -04:00
|
|
|
goto show_error;
|
|
|
|
}
|
|
|
|
|
2016-04-22 09:25:13 -04:00
|
|
|
/* new in curl 7.10.7, extended in 7.19.4. Modified to use
|
|
|
|
CREATE_DIR_RETRY in 7.49.0 */
|
2011-10-04 18:03:20 -04:00
|
|
|
my_setopt(curl, CURLOPT_FTP_CREATE_MISSING_DIRS,
|
2016-04-22 09:25:13 -04:00
|
|
|
(long)(config->ftp_create_dirs?
|
|
|
|
CURLFTP_CREATE_DIR_RETRY:
|
|
|
|
CURLFTP_CREATE_DIR_NONE));
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
/* new in curl 7.10.8 */
|
|
|
|
if(config->max_filesize)
|
|
|
|
my_setopt(curl, CURLOPT_MAXFILESIZE_LARGE,
|
|
|
|
config->max_filesize);
|
|
|
|
|
|
|
|
if(4 == config->ip_version)
|
|
|
|
my_setopt(curl, CURLOPT_IPRESOLVE, CURL_IPRESOLVE_V4);
|
|
|
|
else if(6 == config->ip_version)
|
|
|
|
my_setopt(curl, CURLOPT_IPRESOLVE, CURL_IPRESOLVE_V6);
|
|
|
|
else
|
|
|
|
my_setopt(curl, CURLOPT_IPRESOLVE, CURL_IPRESOLVE_WHATEVER);
|
|
|
|
|
|
|
|
/* new in curl 7.15.5 */
|
|
|
|
if(config->ftp_ssl_reqd)
|
2013-07-22 13:43:08 -04:00
|
|
|
my_setopt_enum(curl, CURLOPT_USE_SSL, (long)CURLUSESSL_ALL);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
/* new in curl 7.11.0 */
|
|
|
|
else if(config->ftp_ssl)
|
2013-07-22 13:43:08 -04:00
|
|
|
my_setopt_enum(curl, CURLOPT_USE_SSL, (long)CURLUSESSL_TRY);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
/* new in curl 7.16.0 */
|
|
|
|
else if(config->ftp_ssl_control)
|
2013-07-22 13:43:08 -04:00
|
|
|
my_setopt_enum(curl, CURLOPT_USE_SSL, (long)CURLUSESSL_CONTROL);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
/* new in curl 7.16.1 */
|
|
|
|
if(config->ftp_ssl_ccc)
|
2013-07-22 12:08:23 -04:00
|
|
|
my_setopt_enum(curl, CURLOPT_FTP_SSL_CCC,
|
|
|
|
(long)config->ftp_ssl_ccc_mode);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
2015-06-18 10:57:38 -04:00
|
|
|
/* new in curl 7.19.4 */
|
|
|
|
if(config->socks5_gssapi_nec)
|
|
|
|
my_setopt_str(curl, CURLOPT_SOCKS5_GSSAPI_NEC,
|
|
|
|
config->socks5_gssapi_nec);
|
|
|
|
|
2017-05-19 12:11:47 -04:00
|
|
|
/* new in curl 7.55.0 */
|
|
|
|
if(config->socks5_auth)
|
|
|
|
my_setopt_bitmask(curl, CURLOPT_SOCKS5_AUTH,
|
|
|
|
(long)config->socks5_auth);
|
|
|
|
|
2015-06-18 10:57:38 -04:00
|
|
|
/* new in curl 7.43.0 */
|
|
|
|
if(config->proxy_service_name)
|
|
|
|
my_setopt_str(curl, CURLOPT_PROXY_SERVICE_NAME,
|
|
|
|
config->proxy_service_name);
|
|
|
|
|
|
|
|
/* new in curl 7.43.0 */
|
|
|
|
if(config->service_name)
|
|
|
|
my_setopt_str(curl, CURLOPT_SERVICE_NAME,
|
|
|
|
config->service_name);
|
2015-03-29 08:52:31 -04:00
|
|
|
|
2019-05-14 04:03:54 -04:00
|
|
|
#ifndef CURL_DISABLE_FTP
|
2011-10-04 18:03:20 -04:00
|
|
|
/* curl 7.13.0 */
|
|
|
|
my_setopt_str(curl, CURLOPT_FTP_ACCOUNT, config->ftp_account);
|
2019-05-14 04:03:54 -04:00
|
|
|
#endif
|
2013-07-22 12:08:23 -04:00
|
|
|
my_setopt(curl, CURLOPT_IGNORE_CONTENT_LENGTH, config->ignorecl?1L:0L);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
2019-05-15 02:42:57 -04:00
|
|
|
#ifndef CURL_DISABLE_FTP
|
2011-10-04 18:03:20 -04:00
|
|
|
/* curl 7.14.2 */
|
2013-07-22 12:08:23 -04:00
|
|
|
my_setopt(curl, CURLOPT_FTP_SKIP_PASV_IP, config->ftp_skip_ip?1L:0L);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
/* curl 7.15.1 */
|
2013-07-22 12:08:23 -04:00
|
|
|
my_setopt(curl, CURLOPT_FTP_FILEMETHOD, (long)config->ftp_filemethod);
|
2019-05-15 02:42:57 -04:00
|
|
|
#endif
|
2011-10-04 18:03:20 -04:00
|
|
|
/* curl 7.15.2 */
|
|
|
|
if(config->localport) {
|
2018-11-05 05:57:29 -05:00
|
|
|
my_setopt(curl, CURLOPT_LOCALPORT, config->localport);
|
|
|
|
my_setopt_str(curl, CURLOPT_LOCALPORTRANGE, config->localportrange);
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
|
2019-05-14 04:03:54 -04:00
|
|
|
#ifndef CURL_DISABLE_FTP
|
2011-10-04 18:03:20 -04:00
|
|
|
/* curl 7.15.5 */
|
|
|
|
my_setopt_str(curl, CURLOPT_FTP_ALTERNATIVE_TO_USER,
|
|
|
|
config->ftp_alternative_to_user);
|
2019-05-14 04:03:54 -04:00
|
|
|
#endif
|
2011-10-04 18:03:20 -04:00
|
|
|
/* curl 7.16.0 */
|
|
|
|
if(config->disable_sessionid)
|
2013-07-22 12:08:23 -04:00
|
|
|
/* disable it */
|
|
|
|
my_setopt(curl, CURLOPT_SSL_SESSIONID_CACHE, 0L);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
/* curl 7.16.2 */
|
|
|
|
if(config->raw) {
|
2013-07-22 12:08:23 -04:00
|
|
|
my_setopt(curl, CURLOPT_HTTP_CONTENT_DECODING, 0L);
|
|
|
|
my_setopt(curl, CURLOPT_HTTP_TRANSFER_DECODING, 0L);
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
/* curl 7.17.1 */
|
|
|
|
if(!config->nokeepalive) {
|
2012-02-09 13:04:08 -05:00
|
|
|
my_setopt(curl, CURLOPT_TCP_KEEPALIVE, 1L);
|
|
|
|
if(config->alivetime != 0) {
|
|
|
|
my_setopt(curl, CURLOPT_TCP_KEEPIDLE, config->alivetime);
|
|
|
|
my_setopt(curl, CURLOPT_TCP_KEEPINTVL, config->alivetime);
|
|
|
|
}
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
2012-02-09 13:04:08 -05:00
|
|
|
else
|
|
|
|
my_setopt(curl, CURLOPT_TCP_KEEPALIVE, 0L);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
/* curl 7.20.0 */
|
|
|
|
if(config->tftp_blksize)
|
|
|
|
my_setopt(curl, CURLOPT_TFTP_BLKSIZE, config->tftp_blksize);
|
|
|
|
|
|
|
|
if(config->mail_from)
|
|
|
|
my_setopt_str(curl, CURLOPT_MAIL_FROM, config->mail_from);
|
|
|
|
|
|
|
|
if(config->mail_rcpt)
|
2012-02-23 04:43:37 -05:00
|
|
|
my_setopt_slist(curl, CURLOPT_MAIL_RCPT, config->mail_rcpt);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
/* curl 7.20.x */
|
|
|
|
if(config->ftp_pret)
|
2013-07-22 12:08:23 -04:00
|
|
|
my_setopt(curl, CURLOPT_FTP_USE_PRET, 1L);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
if(config->proto_present)
|
2012-02-23 04:43:37 -05:00
|
|
|
my_setopt_flags(curl, CURLOPT_PROTOCOLS, config->proto);
|
2011-10-04 18:03:20 -04:00
|
|
|
if(config->proto_redir_present)
|
2012-02-23 04:43:37 -05:00
|
|
|
my_setopt_flags(curl, CURLOPT_REDIR_PROTOCOLS, config->proto_redir);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
2012-06-08 23:42:39 -04:00
|
|
|
if(config->content_disposition
|
2016-05-01 16:07:04 -04:00
|
|
|
&& (urlnode->flags & GETOUT_USEREMOTE))
|
2012-06-08 23:42:39 -04:00
|
|
|
hdrcbdata.honor_cd_filename = TRUE;
|
|
|
|
else
|
|
|
|
hdrcbdata.honor_cd_filename = FALSE;
|
|
|
|
|
|
|
|
hdrcbdata.outs = &outs;
|
|
|
|
hdrcbdata.heads = &heads;
|
2018-05-17 07:56:35 -04:00
|
|
|
hdrcbdata.global = global;
|
|
|
|
hdrcbdata.config = config;
|
2012-05-25 04:33:28 -04:00
|
|
|
|
|
|
|
my_setopt(curl, CURLOPT_HEADERFUNCTION, tool_header_cb);
|
2012-06-08 23:42:39 -04:00
|
|
|
my_setopt(curl, CURLOPT_HEADERDATA, &hdrcbdata);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
if(config->resolve)
|
|
|
|
/* new in 7.21.3 */
|
2012-02-23 04:43:37 -05:00
|
|
|
my_setopt_slist(curl, CURLOPT_RESOLVE, config->resolve);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
2016-01-25 08:37:24 -05:00
|
|
|
if(config->connect_to)
|
|
|
|
/* new in 7.49.0 */
|
|
|
|
my_setopt_slist(curl, CURLOPT_CONNECT_TO, config->connect_to);
|
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
/* new in 7.21.4 */
|
|
|
|
if(curlinfo->features & CURL_VERSION_TLSAUTH_SRP) {
|
|
|
|
if(config->tls_username)
|
|
|
|
my_setopt_str(curl, CURLOPT_TLSAUTH_USERNAME,
|
|
|
|
config->tls_username);
|
|
|
|
if(config->tls_password)
|
|
|
|
my_setopt_str(curl, CURLOPT_TLSAUTH_PASSWORD,
|
|
|
|
config->tls_password);
|
|
|
|
if(config->tls_authtype)
|
|
|
|
my_setopt_str(curl, CURLOPT_TLSAUTH_TYPE,
|
|
|
|
config->tls_authtype);
|
2016-11-16 12:49:15 -05:00
|
|
|
if(config->proxy_tls_username)
|
|
|
|
my_setopt_str(curl, CURLOPT_PROXY_TLSAUTH_USERNAME,
|
|
|
|
config->proxy_tls_username);
|
|
|
|
if(config->proxy_tls_password)
|
|
|
|
my_setopt_str(curl, CURLOPT_PROXY_TLSAUTH_PASSWORD,
|
|
|
|
config->proxy_tls_password);
|
|
|
|
if(config->proxy_tls_authtype)
|
|
|
|
my_setopt_str(curl, CURLOPT_PROXY_TLSAUTH_TYPE,
|
|
|
|
config->proxy_tls_authtype);
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
/* new in 7.22.0 */
|
|
|
|
if(config->gssapi_delegation)
|
|
|
|
my_setopt_str(curl, CURLOPT_GSSAPI_DELEGATION,
|
|
|
|
config->gssapi_delegation);
|
|
|
|
|
2015-07-26 08:15:07 -04:00
|
|
|
/* new in 7.25.0 and 7.44.0 */
|
2015-07-25 16:32:15 -04:00
|
|
|
{
|
|
|
|
long mask = (config->ssl_allow_beast ? CURLSSLOPT_ALLOW_BEAST : 0) |
|
|
|
|
(config->ssl_no_revoke ? CURLSSLOPT_NO_REVOKE : 0);
|
|
|
|
if(mask)
|
|
|
|
my_setopt_bitmask(curl, CURLOPT_SSL_OPTIONS, mask);
|
|
|
|
}
|
2012-02-06 16:25:04 -05:00
|
|
|
|
2016-11-16 12:49:15 -05:00
|
|
|
if(config->proxy_ssl_allow_beast)
|
|
|
|
my_setopt(curl, CURLOPT_PROXY_SSL_OPTIONS,
|
|
|
|
(long)CURLSSLOPT_ALLOW_BEAST);
|
|
|
|
|
2012-02-16 07:19:47 -05:00
|
|
|
if(config->mail_auth)
|
|
|
|
my_setopt_str(curl, CURLOPT_MAIL_AUTH, config->mail_auth);
|
|
|
|
|
2013-04-27 18:02:20 -04:00
|
|
|
/* new in 7.31.0 */
|
2013-04-27 04:54:14 -04:00
|
|
|
if(config->sasl_ir)
|
2013-07-22 12:08:23 -04:00
|
|
|
my_setopt(curl, CURLOPT_SASL_IR, 1L);
|
2013-04-27 04:54:14 -04:00
|
|
|
|
2014-02-10 02:38:55 -05:00
|
|
|
if(config->nonpn) {
|
|
|
|
my_setopt(curl, CURLOPT_SSL_ENABLE_NPN, 0L);
|
|
|
|
}
|
|
|
|
|
|
|
|
if(config->noalpn) {
|
|
|
|
my_setopt(curl, CURLOPT_SSL_ENABLE_ALPN, 0L);
|
|
|
|
}
|
|
|
|
|
2017-01-08 17:51:08 -05:00
|
|
|
/* new in 7.40.0, abstract support added in 7.53.0 */
|
|
|
|
if(config->unix_socket_path) {
|
|
|
|
if(config->abstract_unix_socket) {
|
|
|
|
my_setopt_str(curl, CURLOPT_ABSTRACT_UNIX_SOCKET,
|
|
|
|
config->unix_socket_path);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
my_setopt_str(curl, CURLOPT_UNIX_SOCKET_PATH,
|
|
|
|
config->unix_socket_path);
|
|
|
|
}
|
|
|
|
}
|
2015-08-22 21:49:26 -04:00
|
|
|
/* new in 7.45.0 */
|
|
|
|
if(config->proto_default)
|
|
|
|
my_setopt_str(curl, CURLOPT_DEFAULT_PROTOCOL, config->proto_default);
|
|
|
|
|
2015-12-14 07:29:13 -05:00
|
|
|
/* new in 7.47.0 */
|
|
|
|
if(config->expect100timeout > 0)
|
|
|
|
my_setopt_str(curl, CURLOPT_EXPECT_100_TIMEOUT_MS,
|
|
|
|
(long)(config->expect100timeout*1000));
|
|
|
|
|
2015-08-24 00:15:01 -04:00
|
|
|
/* new in 7.48.0 */
|
|
|
|
if(config->tftp_no_options)
|
|
|
|
my_setopt(curl, CURLOPT_TFTP_NO_OPTIONS, 1L);
|
|
|
|
|
2018-01-30 19:33:51 -05:00
|
|
|
/* new in 7.59.0 */
|
|
|
|
if(config->happy_eyeballs_timeout_ms != CURL_HET_DEFAULT)
|
2018-02-21 15:16:50 -05:00
|
|
|
my_setopt(curl, CURLOPT_HAPPY_EYEBALLS_TIMEOUT_MS,
|
2018-01-30 19:33:51 -05:00
|
|
|
config->happy_eyeballs_timeout_ms);
|
|
|
|
|
2016-12-01 07:05:04 -05:00
|
|
|
/* new in 7.60.0 */
|
|
|
|
if(config->haproxy_protocol)
|
|
|
|
my_setopt(curl, CURLOPT_HAPROXYPROTOCOL, 1L);
|
|
|
|
|
2018-02-25 14:17:25 -05:00
|
|
|
if(config->disallow_username_in_url)
|
|
|
|
my_setopt(curl, CURLOPT_DISALLOW_USERNAME_IN_URL, 1L);
|
|
|
|
|
2019-03-03 05:17:52 -05:00
|
|
|
#ifdef USE_ALTSVC
|
|
|
|
/* only if explicitly enabled in configure */
|
|
|
|
if(config->altsvc)
|
|
|
|
my_setopt_str(curl, CURLOPT_ALTSVC, config->altsvc);
|
|
|
|
#endif
|
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
/* initialize retry vars for loop below */
|
|
|
|
retry_sleep_default = (config->retry_delay) ?
|
|
|
|
config->retry_delay*1000L : RETRY_SLEEP_DEFAULT; /* ms */
|
|
|
|
|
|
|
|
retry_numretries = config->req_retry;
|
|
|
|
retry_sleep = retry_sleep_default; /* ms */
|
2011-10-06 11:39:00 -04:00
|
|
|
retrystart = tvnow();
|
2011-10-04 18:03:20 -04:00
|
|
|
|
2012-02-05 12:44:22 -05:00
|
|
|
#ifndef CURL_DISABLE_LIBCURL_OPTION
|
2015-09-20 02:16:23 -04:00
|
|
|
if(global->libcurl) {
|
|
|
|
result = easysrc_perform();
|
|
|
|
if(result)
|
|
|
|
goto show_error;
|
2011-10-22 08:46:49 -04:00
|
|
|
}
|
2012-02-05 12:44:22 -05:00
|
|
|
#endif
|
2011-10-22 08:46:49 -04:00
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
for(;;) {
|
2012-06-20 11:51:06 -04:00
|
|
|
#ifdef USE_METALINK
|
|
|
|
if(!metalink && config->use_metalink) {
|
|
|
|
/* If outs.metalink_parser is non-NULL, delete it first. */
|
|
|
|
if(outs.metalink_parser)
|
|
|
|
metalink_parser_context_delete(outs.metalink_parser);
|
|
|
|
outs.metalink_parser = metalink_parser_context_new();
|
|
|
|
if(outs.metalink_parser == NULL) {
|
2014-12-16 02:35:47 -05:00
|
|
|
result = CURLE_OUT_OF_MEMORY;
|
2012-06-20 11:51:06 -04:00
|
|
|
goto show_error;
|
|
|
|
}
|
2014-03-01 08:00:31 -05:00
|
|
|
fprintf(config->global->errors,
|
|
|
|
"Metalink: parsing (%s) metalink/XML...\n", this_url);
|
2012-06-20 11:51:06 -04:00
|
|
|
}
|
2012-06-26 09:55:16 -04:00
|
|
|
else if(metalink)
|
2014-03-01 08:00:31 -05:00
|
|
|
fprintf(config->global->errors,
|
|
|
|
"Metalink: fetching (%s) from (%s)...\n",
|
2012-06-26 09:55:16 -04:00
|
|
|
mlfile->filename, this_url);
|
2012-06-20 11:51:06 -04:00
|
|
|
#endif /* USE_METALINK */
|
|
|
|
|
2013-08-10 16:55:59 -04:00
|
|
|
#ifdef CURLDEBUG
|
|
|
|
if(config->test_event_based)
|
2014-12-16 02:35:47 -05:00
|
|
|
result = curl_easy_perform_ev(curl);
|
2013-08-10 16:55:59 -04:00
|
|
|
else
|
|
|
|
#endif
|
2014-12-16 02:35:47 -05:00
|
|
|
result = curl_easy_perform(curl);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
2015-04-23 08:01:08 -04:00
|
|
|
if(!result && !outs.stream && !outs.bytes) {
|
|
|
|
/* we have received no data despite the transfer was successful
|
|
|
|
==> force cration of an empty output file (if an output file
|
|
|
|
was specified) */
|
|
|
|
long cond_unmet = 0L;
|
|
|
|
/* do not create (or even overwrite) the file in case we get no
|
|
|
|
data because of unmet condition */
|
|
|
|
curl_easy_getinfo(curl, CURLINFO_CONDITION_UNMET, &cond_unmet);
|
2018-12-17 06:51:51 -05:00
|
|
|
if(!cond_unmet && !tool_create_output_file(&outs))
|
2015-04-23 08:01:08 -04:00
|
|
|
result = CURLE_WRITE_ERROR;
|
|
|
|
}
|
2015-03-30 07:56:30 -04:00
|
|
|
|
2014-02-27 15:21:23 -05:00
|
|
|
if(outs.is_cd_filename && outs.stream && !global->mute &&
|
2011-10-04 18:03:20 -04:00
|
|
|
outs.filename)
|
|
|
|
printf("curl: Saved to filename '%s'\n", outs.filename);
|
|
|
|
|
|
|
|
/* if retry-max-time is non-zero, make sure we haven't exceeded the
|
|
|
|
time */
|
|
|
|
if(retry_numretries &&
|
|
|
|
(!config->retry_maxtime ||
|
2011-10-06 11:39:00 -04:00
|
|
|
(tvdiff(tvnow(), retrystart) <
|
2011-10-04 18:03:20 -04:00
|
|
|
config->retry_maxtime*1000L)) ) {
|
|
|
|
enum {
|
|
|
|
RETRY_NO,
|
|
|
|
RETRY_TIMEOUT,
|
2016-10-09 19:00:25 -04:00
|
|
|
RETRY_CONNREFUSED,
|
2011-10-04 18:03:20 -04:00
|
|
|
RETRY_HTTP,
|
|
|
|
RETRY_FTP,
|
|
|
|
RETRY_LAST /* not used */
|
|
|
|
} retry = RETRY_NO;
|
|
|
|
long response;
|
2014-12-16 02:35:47 -05:00
|
|
|
if((CURLE_OPERATION_TIMEDOUT == result) ||
|
|
|
|
(CURLE_COULDNT_RESOLVE_HOST == result) ||
|
|
|
|
(CURLE_COULDNT_RESOLVE_PROXY == result) ||
|
|
|
|
(CURLE_FTP_ACCEPT_TIMEOUT == result))
|
2011-10-04 18:03:20 -04:00
|
|
|
/* retry timeout always */
|
|
|
|
retry = RETRY_TIMEOUT;
|
2016-10-09 19:00:25 -04:00
|
|
|
else if(config->retry_connrefused &&
|
|
|
|
(CURLE_COULDNT_CONNECT == result)) {
|
|
|
|
long oserrno;
|
|
|
|
curl_easy_getinfo(curl, CURLINFO_OS_ERRNO, &oserrno);
|
|
|
|
if(ECONNREFUSED == oserrno)
|
|
|
|
retry = RETRY_CONNREFUSED;
|
|
|
|
}
|
2014-12-16 02:35:47 -05:00
|
|
|
else if((CURLE_OK == result) ||
|
2011-10-04 18:03:20 -04:00
|
|
|
(config->failonerror &&
|
2014-12-16 02:35:47 -05:00
|
|
|
(CURLE_HTTP_RETURNED_ERROR == result))) {
|
2011-10-04 18:03:20 -04:00
|
|
|
/* If it returned OK. _or_ failonerror was enabled and it
|
|
|
|
returned due to such an error, check for HTTP transient
|
|
|
|
errors to retry on. */
|
|
|
|
char *effective_url = NULL;
|
|
|
|
curl_easy_getinfo(curl, CURLINFO_EFFECTIVE_URL, &effective_url);
|
|
|
|
if(effective_url &&
|
|
|
|
checkprefix("http", effective_url)) {
|
|
|
|
/* This was HTTP(S) */
|
|
|
|
curl_easy_getinfo(curl, CURLINFO_RESPONSE_CODE, &response);
|
|
|
|
|
|
|
|
switch(response) {
|
2018-08-31 15:27:54 -04:00
|
|
|
case 408: /* Request Timeout */
|
2011-10-04 18:03:20 -04:00
|
|
|
case 500: /* Internal Server Error */
|
|
|
|
case 502: /* Bad Gateway */
|
|
|
|
case 503: /* Service Unavailable */
|
|
|
|
case 504: /* Gateway Timeout */
|
|
|
|
retry = RETRY_HTTP;
|
|
|
|
/*
|
|
|
|
* At this point, we have already written data to the output
|
|
|
|
* file (or terminal). If we write to a file, we must rewind
|
|
|
|
* or close/re-open the file so that the next attempt starts
|
|
|
|
* over from the beginning.
|
|
|
|
*/
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} /* if CURLE_OK */
|
2014-12-16 02:35:47 -05:00
|
|
|
else if(result) {
|
2018-04-06 15:00:02 -04:00
|
|
|
long protocol;
|
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
curl_easy_getinfo(curl, CURLINFO_RESPONSE_CODE, &response);
|
2018-04-06 15:00:02 -04:00
|
|
|
curl_easy_getinfo(curl, CURLINFO_PROTOCOL, &protocol);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
2018-04-06 15:00:02 -04:00
|
|
|
if((protocol == CURLPROTO_FTP || protocol == CURLPROTO_FTPS) &&
|
|
|
|
response / 100 == 4)
|
2011-10-04 18:03:20 -04:00
|
|
|
/*
|
|
|
|
* This is typically when the FTP server only allows a certain
|
|
|
|
* amount of users and we are not one of them. All 4xx codes
|
|
|
|
* are transient.
|
|
|
|
*/
|
|
|
|
retry = RETRY_FTP;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(retry) {
|
|
|
|
static const char * const m[]={
|
2016-10-09 19:00:25 -04:00
|
|
|
NULL,
|
|
|
|
"timeout",
|
|
|
|
"connection refused",
|
|
|
|
"HTTP error",
|
|
|
|
"FTP error"
|
2011-10-04 18:03:20 -04:00
|
|
|
};
|
2015-02-27 15:48:38 -05:00
|
|
|
|
|
|
|
warnf(config->global, "Transient problem: %s "
|
2011-10-04 18:03:20 -04:00
|
|
|
"Will retry in %ld seconds. "
|
|
|
|
"%ld retries left.\n",
|
|
|
|
m[retry], retry_sleep/1000L, retry_numretries);
|
|
|
|
|
|
|
|
tool_go_sleep(retry_sleep);
|
|
|
|
retry_numretries--;
|
|
|
|
if(!config->retry_delay) {
|
|
|
|
retry_sleep *= 2;
|
|
|
|
if(retry_sleep > RETRY_SLEEP_MAX)
|
|
|
|
retry_sleep = RETRY_SLEEP_MAX;
|
|
|
|
}
|
2015-05-22 10:18:36 -04:00
|
|
|
if(outs.bytes && outs.filename && outs.stream) {
|
2017-09-20 06:03:44 -04:00
|
|
|
int rc;
|
2011-10-04 18:03:20 -04:00
|
|
|
/* We have written data to a output file, we truncate file
|
|
|
|
*/
|
2014-02-27 15:21:23 -05:00
|
|
|
if(!global->mute)
|
2014-03-01 08:00:31 -05:00
|
|
|
fprintf(global->errors, "Throwing away %"
|
2011-10-04 18:03:20 -04:00
|
|
|
CURL_FORMAT_CURL_OFF_T " bytes\n",
|
|
|
|
outs.bytes);
|
|
|
|
fflush(outs.stream);
|
|
|
|
/* truncate file at the position where we started appending */
|
|
|
|
#ifdef HAVE_FTRUNCATE
|
2016-04-03 14:28:34 -04:00
|
|
|
if(ftruncate(fileno(outs.stream), outs.init)) {
|
2011-10-04 18:03:20 -04:00
|
|
|
/* when truncate fails, we can't just append as then we'll
|
|
|
|
create something strange, bail out */
|
2014-02-27 15:21:23 -05:00
|
|
|
if(!global->mute)
|
2014-03-01 08:00:31 -05:00
|
|
|
fprintf(global->errors,
|
2011-10-04 18:03:20 -04:00
|
|
|
"failed to truncate, exiting\n");
|
2014-12-16 02:35:47 -05:00
|
|
|
result = CURLE_WRITE_ERROR;
|
2011-10-04 18:03:20 -04:00
|
|
|
goto quit_urls;
|
|
|
|
}
|
|
|
|
/* now seek to the end of the file, the position where we
|
|
|
|
just truncated the file in a large file-safe way */
|
2017-09-20 06:03:44 -04:00
|
|
|
rc = fseek(outs.stream, 0, SEEK_END);
|
2011-10-04 18:03:20 -04:00
|
|
|
#else
|
|
|
|
/* ftruncate is not available, so just reposition the file
|
|
|
|
to the location we would have truncated it. This won't
|
|
|
|
work properly with large files on 32-bit systems, but
|
|
|
|
most of those will have ftruncate. */
|
2017-09-20 06:03:44 -04:00
|
|
|
rc = fseek(outs.stream, (long)outs.init, SEEK_SET);
|
2011-10-04 18:03:20 -04:00
|
|
|
#endif
|
2017-09-20 06:03:44 -04:00
|
|
|
if(rc) {
|
|
|
|
if(!global->mute)
|
|
|
|
fprintf(global->errors,
|
|
|
|
"failed seeking to end of file, exiting\n");
|
|
|
|
result = CURLE_WRITE_ERROR;
|
|
|
|
goto quit_urls;
|
|
|
|
}
|
2011-10-04 18:03:20 -04:00
|
|
|
outs.bytes = 0; /* clear for next round */
|
|
|
|
}
|
|
|
|
continue; /* curl_easy_perform loop */
|
|
|
|
}
|
|
|
|
} /* if retry_numretries */
|
2012-04-28 08:48:56 -04:00
|
|
|
else if(metalink) {
|
|
|
|
/* Metalink: Decide to try the next resource or
|
|
|
|
not. Basically, we want to try the next resource if
|
|
|
|
download was not successful. */
|
|
|
|
long response;
|
2014-12-16 02:35:47 -05:00
|
|
|
if(CURLE_OK == result) {
|
2012-04-28 08:48:56 -04:00
|
|
|
char *effective_url = NULL;
|
|
|
|
curl_easy_getinfo(curl, CURLINFO_EFFECTIVE_URL, &effective_url);
|
|
|
|
if(effective_url &&
|
2016-10-31 16:49:38 -04:00
|
|
|
curl_strnequal(effective_url, "http", 4)) {
|
2012-04-28 08:48:56 -04:00
|
|
|
/* This was HTTP(S) */
|
|
|
|
curl_easy_getinfo(curl, CURLINFO_RESPONSE_CODE, &response);
|
|
|
|
if(response != 200 && response != 206) {
|
|
|
|
metalink_next_res = 1;
|
2014-03-01 08:00:31 -05:00
|
|
|
fprintf(global->errors,
|
2012-06-26 09:55:16 -04:00
|
|
|
"Metalink: fetching (%s) from (%s) FAILED "
|
2017-02-19 08:10:54 -05:00
|
|
|
"(HTTP status code %ld)\n",
|
2012-06-26 09:55:16 -04:00
|
|
|
mlfile->filename, this_url, response);
|
2012-04-28 08:48:56 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-06-26 09:55:16 -04:00
|
|
|
else {
|
2012-04-28 08:48:56 -04:00
|
|
|
metalink_next_res = 1;
|
2014-03-01 08:00:31 -05:00
|
|
|
fprintf(global->errors,
|
2012-06-26 09:55:16 -04:00
|
|
|
"Metalink: fetching (%s) from (%s) FAILED (%s)\n",
|
|
|
|
mlfile->filename, this_url,
|
|
|
|
(errorbuffer[0]) ?
|
2014-12-16 02:35:47 -05:00
|
|
|
errorbuffer : curl_easy_strerror(result));
|
2012-06-26 09:55:16 -04:00
|
|
|
}
|
2012-04-28 08:48:56 -04:00
|
|
|
}
|
2012-06-26 09:55:16 -04:00
|
|
|
if(metalink && !metalink_next_res)
|
2014-03-01 08:00:31 -05:00
|
|
|
fprintf(global->errors, "Metalink: fetching (%s) from (%s) OK\n",
|
2012-06-26 09:55:16 -04:00
|
|
|
mlfile->filename, this_url);
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
/* In all ordinary cases, just break out of loop here */
|
|
|
|
break; /* curl_easy_perform loop */
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2014-03-01 08:20:20 -05:00
|
|
|
if((global->progressmode == CURL_PROGRESS_BAR) &&
|
2011-10-04 18:03:20 -04:00
|
|
|
progressbar.calls)
|
|
|
|
/* if the custom progress bar has been displayed, we output a
|
|
|
|
newline here */
|
|
|
|
fputs("\n", progressbar.out);
|
|
|
|
|
|
|
|
if(config->writeout)
|
2012-03-04 18:07:03 -05:00
|
|
|
ourWriteOut(curl, &outs, config->writeout);
|
2011-10-06 11:39:00 -04:00
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
/*
|
|
|
|
** Code within this loop may jump directly here to label 'show_error'
|
|
|
|
** in order to display an error message for CURLcode stored in 'res'
|
|
|
|
** variable and exit loop once that necessary writing and cleanup
|
|
|
|
** in label 'quit_urls' has been done.
|
|
|
|
*/
|
|
|
|
|
|
|
|
show_error:
|
|
|
|
|
|
|
|
#ifdef __VMS
|
|
|
|
if(is_vms_shell()) {
|
|
|
|
/* VMS DCL shell behavior */
|
2014-02-23 11:37:28 -05:00
|
|
|
if(!global->showerror)
|
2011-10-04 18:03:20 -04:00
|
|
|
vms_show = VMSSTS_HIDE;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
#endif
|
2017-06-16 05:30:36 -04:00
|
|
|
if(config->synthetic_error) {
|
|
|
|
;
|
|
|
|
}
|
|
|
|
else if(result && global->showerror) {
|
2014-12-16 02:35:47 -05:00
|
|
|
fprintf(global->errors, "curl: (%d) %s\n", result, (errorbuffer[0]) ?
|
|
|
|
errorbuffer : curl_easy_strerror(result));
|
2018-11-19 20:48:59 -05:00
|
|
|
if(result == CURLE_PEER_FAILED_VERIFICATION)
|
2017-08-22 03:07:11 -04:00
|
|
|
fputs(CURL_CA_CERT_ERRORMSG, global->errors);
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Fall through comment to 'quit_urls' label */
|
|
|
|
|
|
|
|
/*
|
|
|
|
** Upon error condition and always that a message has already been
|
|
|
|
** displayed, code within this loop may jump directly here to label
|
|
|
|
** 'quit_urls' otherwise it should jump to 'show_error' label above.
|
|
|
|
**
|
|
|
|
** When 'res' variable is _not_ CURLE_OK loop will exit once that
|
|
|
|
** all code following 'quit_urls' has been executed. Otherwise it
|
|
|
|
** will loop to the beginning from where it may exit if there are
|
|
|
|
** no more urls left.
|
|
|
|
*/
|
|
|
|
|
|
|
|
quit_urls:
|
|
|
|
|
|
|
|
/* Set file extended attributes */
|
2014-12-16 02:35:47 -05:00
|
|
|
if(!result && config->xattr && outs.fopened && outs.stream) {
|
2011-10-04 18:03:20 -04:00
|
|
|
int rc = fwrite_xattr(curl, fileno(outs.stream));
|
|
|
|
if(rc)
|
2015-02-27 15:48:38 -05:00
|
|
|
warnf(config->global, "Error setting extended attributes: %s\n",
|
2011-10-04 18:03:20 -04:00
|
|
|
strerror(errno));
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Close the file */
|
|
|
|
if(outs.fopened && outs.stream) {
|
|
|
|
int rc = fclose(outs.stream);
|
2014-12-16 02:35:47 -05:00
|
|
|
if(!result && rc) {
|
2011-10-04 18:03:20 -04:00
|
|
|
/* something went wrong in the writing process */
|
2014-12-16 02:35:47 -05:00
|
|
|
result = CURLE_WRITE_ERROR;
|
|
|
|
fprintf(global->errors, "(%d) Failed writing body\n", result);
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
else if(!outs.s_isreg && outs.stream) {
|
|
|
|
/* Dump standard stream buffered data */
|
|
|
|
int rc = fflush(outs.stream);
|
2014-12-16 02:35:47 -05:00
|
|
|
if(!result && rc) {
|
2011-10-04 18:03:20 -04:00
|
|
|
/* something went wrong in the writing process */
|
2014-12-16 02:35:47 -05:00
|
|
|
result = CURLE_WRITE_ERROR;
|
|
|
|
fprintf(global->errors, "(%d) Failed writing body\n", result);
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef __AMIGA__
|
2014-12-16 02:35:47 -05:00
|
|
|
if(!result && outs.s_isreg && outs.filename) {
|
2011-10-04 18:03:20 -04:00
|
|
|
/* Set the url (up to 80 chars) as comment for the file */
|
2019-03-10 12:13:40 -04:00
|
|
|
if(strlen(urlnode->url) > 78)
|
|
|
|
urlnode->url[79] = '\0';
|
|
|
|
SetComment(outs.filename, urlnode->url);
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* File time can only be set _after_ the file has been closed */
|
2014-12-16 02:35:47 -05:00
|
|
|
if(!result && config->remote_time && outs.s_isreg && outs.filename) {
|
2011-10-04 18:03:20 -04:00
|
|
|
/* Ask libcurl if we got a remote file time */
|
2018-02-05 15:57:39 -05:00
|
|
|
curl_off_t filetime = -1;
|
|
|
|
curl_easy_getinfo(curl, CURLINFO_FILETIME_T, &filetime);
|
|
|
|
setfiletime(filetime, outs.filename, config->global->errors);
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
2012-04-28 09:53:34 -04:00
|
|
|
|
2012-06-07 17:49:27 -04:00
|
|
|
#ifdef USE_METALINK
|
2014-12-16 02:35:47 -05:00
|
|
|
if(!metalink && config->use_metalink && result == CURLE_OK) {
|
2012-06-27 11:20:20 -04:00
|
|
|
int rv = parse_metalink(config, &outs, this_url);
|
|
|
|
if(rv == 0)
|
2014-03-01 08:00:31 -05:00
|
|
|
fprintf(config->global->errors, "Metalink: parsing (%s) OK\n",
|
|
|
|
this_url);
|
2012-06-27 11:20:20 -04:00
|
|
|
else if(rv == -1)
|
2014-03-01 08:00:31 -05:00
|
|
|
fprintf(config->global->errors, "Metalink: parsing (%s) FAILED\n",
|
2012-06-26 09:55:16 -04:00
|
|
|
this_url);
|
2012-04-28 09:53:34 -04:00
|
|
|
}
|
2014-12-16 02:35:47 -05:00
|
|
|
else if(metalink && result == CURLE_OK && !metalink_next_res) {
|
2014-03-01 08:00:31 -05:00
|
|
|
int rv = metalink_check_hash(global, mlfile, outs.filename);
|
Check checksum of downloaded file if checksum is available
Metalink file contains several hash types of checksums, such as
md5, sha-1, sha-256, etc. To deal with these checksums, I created
abstraction layer based on lib/curl_md5.h and
lib/md5.c. Basically, they are almost the same but I changed the
code so that it is not hash type dependent. Currently,
GNUTLS(nettle or gcrypt) and OpenSSL functions are supported.
Checksum checking is done by reopening download file. If there
is an I/O error, the current implementation just prints error
message and does not try next resource.
In this patch, the supported hash types are: md5, sha-1 and sha-256.
2012-05-21 12:40:11 -04:00
|
|
|
if(rv == 0) {
|
|
|
|
metalink_next_res = 1;
|
|
|
|
}
|
|
|
|
}
|
2012-06-07 17:49:27 -04:00
|
|
|
#endif /* USE_METALINK */
|
2012-04-28 09:53:34 -04:00
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
/* No more business with this output struct */
|
|
|
|
if(outs.alloc_filename)
|
|
|
|
Curl_safefree(outs.filename);
|
2012-06-20 11:51:06 -04:00
|
|
|
#ifdef USE_METALINK
|
|
|
|
if(outs.metalink_parser)
|
|
|
|
metalink_parser_context_delete(outs.metalink_parser);
|
|
|
|
#endif /* USE_METALINK */
|
2011-10-04 18:03:20 -04:00
|
|
|
memset(&outs, 0, sizeof(struct OutStruct));
|
2012-06-08 23:42:39 -04:00
|
|
|
hdrcbdata.outs = NULL;
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
/* Free loop-local allocated memory and close loop-local opened fd */
|
|
|
|
|
|
|
|
Curl_safefree(outfile);
|
|
|
|
Curl_safefree(this_url);
|
|
|
|
|
2012-08-06 17:59:28 -04:00
|
|
|
if(infdopen)
|
2011-10-04 18:03:20 -04:00
|
|
|
close(infd);
|
|
|
|
|
2012-04-28 08:48:56 -04:00
|
|
|
if(metalink) {
|
2012-04-28 10:46:32 -04:00
|
|
|
/* Should exit if error is fatal. */
|
2014-12-16 02:35:47 -05:00
|
|
|
if(is_fatal_error(result)) {
|
2012-04-28 08:48:56 -04:00
|
|
|
break;
|
|
|
|
}
|
2012-05-25 06:24:32 -04:00
|
|
|
if(!metalink_next_res)
|
|
|
|
break;
|
|
|
|
mlres = mlres->next;
|
|
|
|
if(mlres == NULL)
|
2012-04-28 08:48:56 -04:00
|
|
|
break;
|
|
|
|
}
|
2018-04-25 15:53:27 -04:00
|
|
|
else if(urlnum > 1) {
|
2012-02-07 16:06:03 -05:00
|
|
|
/* when url globbing, exit loop upon critical error */
|
2014-12-16 02:35:47 -05:00
|
|
|
if(is_fatal_error(result))
|
2012-02-07 16:06:03 -05:00
|
|
|
break;
|
|
|
|
}
|
2014-12-16 02:35:47 -05:00
|
|
|
else if(result)
|
2012-02-07 16:06:03 -05:00
|
|
|
/* when not url globbing, exit loop upon any error */
|
|
|
|
break;
|
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
} /* loop to the next URL */
|
|
|
|
|
|
|
|
/* Free loop-local allocated memory */
|
|
|
|
|
|
|
|
Curl_safefree(uploadfile);
|
|
|
|
|
|
|
|
if(urls) {
|
|
|
|
/* Free list of remaining URLs */
|
|
|
|
glob_cleanup(urls);
|
|
|
|
urls = NULL;
|
|
|
|
}
|
|
|
|
|
2012-02-07 16:06:03 -05:00
|
|
|
if(infilenum > 1) {
|
|
|
|
/* when file globbing, exit loop upon critical error */
|
2014-12-16 02:35:47 -05:00
|
|
|
if(is_fatal_error(result))
|
2012-02-07 16:06:03 -05:00
|
|
|
break;
|
|
|
|
}
|
2014-12-16 02:35:47 -05:00
|
|
|
else if(result)
|
2012-02-07 16:06:03 -05:00
|
|
|
/* when not file globbing, exit loop upon any error */
|
|
|
|
break;
|
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
} /* loop to the next globbed upload file */
|
|
|
|
|
|
|
|
/* Free loop-local allocated memory */
|
|
|
|
|
|
|
|
Curl_safefree(outfiles);
|
|
|
|
|
|
|
|
if(inglob) {
|
|
|
|
/* Free list of globbed upload files */
|
|
|
|
glob_cleanup(inglob);
|
|
|
|
inglob = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Free this URL node data without destroying the
|
|
|
|
the node itself nor modifying next pointer. */
|
|
|
|
Curl_safefree(urlnode->url);
|
|
|
|
Curl_safefree(urlnode->outfile);
|
|
|
|
Curl_safefree(urlnode->infile);
|
|
|
|
urlnode->flags = 0;
|
|
|
|
|
|
|
|
/*
|
2016-11-12 08:19:29 -05:00
|
|
|
** Bail out upon critical errors or --fail-early
|
2011-10-04 18:03:20 -04:00
|
|
|
*/
|
2016-11-12 08:19:29 -05:00
|
|
|
if(is_fatal_error(result) || (result && global->fail_early))
|
2011-10-04 18:03:20 -04:00
|
|
|
goto quit_curl;
|
|
|
|
|
|
|
|
} /* for-loop through all URLs */
|
|
|
|
|
|
|
|
/*
|
|
|
|
** Nested loops end here.
|
|
|
|
*/
|
|
|
|
|
|
|
|
quit_curl:
|
|
|
|
|
2014-03-01 08:49:28 -05:00
|
|
|
/* Reset the global config variables */
|
|
|
|
global->noprogress = orig_noprogress;
|
|
|
|
global->isatty = orig_isatty;
|
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
/* Free function-local referenced allocated memory */
|
|
|
|
Curl_safefree(httpgetfields);
|
|
|
|
|
|
|
|
/* Free list of given URLs */
|
|
|
|
clean_getout(config);
|
|
|
|
|
2012-06-08 23:42:39 -04:00
|
|
|
hdrcbdata.heads = NULL;
|
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
/* Close function-local opened file descriptors */
|
|
|
|
if(heads.fopened && heads.stream)
|
|
|
|
fclose(heads.stream);
|
2014-03-02 04:28:17 -05:00
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
if(heads.alloc_filename)
|
|
|
|
Curl_safefree(heads.filename);
|
|
|
|
|
2012-04-26 09:59:52 -04:00
|
|
|
/* Release metalink related resources here */
|
|
|
|
clean_metalink(config);
|
2014-02-23 10:10:18 -05:00
|
|
|
|
2014-12-16 02:35:47 -05:00
|
|
|
return result;
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
2014-02-02 10:20:37 -05:00
|
|
|
|
2014-02-23 09:32:22 -05:00
|
|
|
CURLcode operate(struct GlobalConfig *config, int argc, argv_item_t argv[])
|
2014-02-02 10:20:37 -05:00
|
|
|
{
|
2014-02-22 13:57:02 -05:00
|
|
|
CURLcode result = CURLE_OK;
|
2014-02-02 10:28:25 -05:00
|
|
|
|
2014-02-23 09:32:22 -05:00
|
|
|
/* Setup proper locale from environment */
|
|
|
|
#ifdef HAVE_SETLOCALE
|
|
|
|
setlocale(LC_ALL, "");
|
|
|
|
#endif
|
2014-02-02 10:28:25 -05:00
|
|
|
|
2014-02-05 15:28:36 -05:00
|
|
|
/* Parse .curlrc if necessary */
|
2016-04-28 16:32:05 -04:00
|
|
|
if((argc == 1) ||
|
2016-10-31 16:49:38 -04:00
|
|
|
(!curl_strequal(argv[1], "-q") &&
|
|
|
|
!curl_strequal(argv[1], "--disable"))) {
|
2014-02-23 11:04:39 -05:00
|
|
|
parseconfig(NULL, config); /* ignore possible failure */
|
2014-02-05 15:28:36 -05:00
|
|
|
|
|
|
|
/* If we had no arguments then make sure a url was specified in .curlrc */
|
2014-02-23 09:32:22 -05:00
|
|
|
if((argc < 2) && (!config->first->url_list)) {
|
2014-03-01 08:00:31 -05:00
|
|
|
helpf(config->errors, NULL);
|
2014-02-05 15:28:36 -05:00
|
|
|
result = CURLE_FAILED_INIT;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-02-06 14:31:44 -05:00
|
|
|
if(!result) {
|
|
|
|
/* Parse the command line arguments */
|
|
|
|
ParameterError res = parse_args(config, argc, argv);
|
|
|
|
if(res) {
|
2014-02-22 15:58:43 -05:00
|
|
|
result = CURLE_OK;
|
|
|
|
|
2014-02-23 05:58:56 -05:00
|
|
|
/* Check if we were asked for the help */
|
|
|
|
if(res == PARAM_HELP_REQUESTED)
|
|
|
|
tool_help();
|
2014-02-23 05:37:44 -05:00
|
|
|
/* Check if we were asked for the manual */
|
2014-02-23 05:58:56 -05:00
|
|
|
else if(res == PARAM_MANUAL_REQUESTED)
|
2014-02-23 05:37:44 -05:00
|
|
|
hugehelp();
|
2014-02-23 05:16:36 -05:00
|
|
|
/* Check if we were asked for the version information */
|
2014-02-23 05:37:44 -05:00
|
|
|
else if(res == PARAM_VERSION_INFO_REQUESTED)
|
2014-02-23 05:16:36 -05:00
|
|
|
tool_version_info();
|
2014-02-22 15:58:43 -05:00
|
|
|
/* Check if we were asked to list the SSL engines */
|
2014-02-23 07:10:42 -05:00
|
|
|
else if(res == PARAM_ENGINES_REQUESTED)
|
2014-02-22 15:58:43 -05:00
|
|
|
tool_list_engines(config->easy);
|
2015-08-22 21:49:26 -04:00
|
|
|
else if(res == PARAM_LIBCURL_UNSUPPORTED_PROTOCOL)
|
|
|
|
result = CURLE_UNSUPPORTED_PROTOCOL;
|
2014-02-23 05:58:56 -05:00
|
|
|
else
|
2014-02-06 14:31:44 -05:00
|
|
|
result = CURLE_FAILED_INIT;
|
2014-02-06 14:43:50 -05:00
|
|
|
}
|
2014-02-09 06:01:36 -05:00
|
|
|
else {
|
2014-03-02 04:28:17 -05:00
|
|
|
#ifndef CURL_DISABLE_LIBCURL_OPTION
|
2015-09-21 02:21:38 -04:00
|
|
|
if(config->libcurl) {
|
|
|
|
/* Initialise the libcurl source output */
|
2015-09-20 02:16:23 -04:00
|
|
|
result = easysrc_init();
|
2015-09-21 02:21:38 -04:00
|
|
|
}
|
2014-03-02 04:28:17 -05:00
|
|
|
#endif
|
2014-02-09 06:01:36 -05:00
|
|
|
|
2014-03-02 04:28:17 -05:00
|
|
|
/* Perform the main operations */
|
|
|
|
if(!result) {
|
|
|
|
size_t count = 0;
|
|
|
|
struct OperationConfig *operation = config->first;
|
2014-02-14 17:05:27 -05:00
|
|
|
|
2018-03-15 22:51:03 -04:00
|
|
|
/* Get the required arguments for each operation */
|
2014-03-02 04:28:17 -05:00
|
|
|
while(!result && operation) {
|
|
|
|
result = get_args(operation, count++);
|
|
|
|
|
|
|
|
operation = operation->next;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Set the current operation pointer */
|
|
|
|
config->current = config->first;
|
2014-02-14 17:05:27 -05:00
|
|
|
|
2014-03-02 04:28:17 -05:00
|
|
|
/* Perform each operation */
|
|
|
|
while(!result && config->current) {
|
|
|
|
result = operate_do(config, config->current);
|
2014-02-14 17:05:27 -05:00
|
|
|
|
2014-03-02 04:28:17 -05:00
|
|
|
config->current = config->current->next;
|
2017-01-13 08:07:52 -05:00
|
|
|
|
|
|
|
if(config->current && config->current->easy)
|
|
|
|
curl_easy_reset(config->current->easy);
|
2014-03-02 04:28:17 -05:00
|
|
|
}
|
2014-02-09 06:01:36 -05:00
|
|
|
|
2014-03-02 04:28:17 -05:00
|
|
|
#ifndef CURL_DISABLE_LIBCURL_OPTION
|
2015-09-21 02:21:38 -04:00
|
|
|
if(config->libcurl) {
|
|
|
|
/* Cleanup the libcurl source output */
|
|
|
|
easysrc_cleanup();
|
2014-03-02 04:50:36 -05:00
|
|
|
|
2015-09-21 02:21:38 -04:00
|
|
|
/* Dump the libcurl code if previously enabled */
|
|
|
|
dumpeasysrc(config);
|
|
|
|
}
|
2014-03-02 04:28:17 -05:00
|
|
|
#endif
|
2014-02-09 06:01:36 -05:00
|
|
|
}
|
2014-03-02 04:28:17 -05:00
|
|
|
else
|
|
|
|
helpf(config->errors, "out of memory\n");
|
2014-02-09 06:01:36 -05:00
|
|
|
}
|
2014-02-06 14:31:44 -05:00
|
|
|
}
|
2014-02-02 10:37:28 -05:00
|
|
|
|
|
|
|
return result;
|
2014-02-02 10:20:37 -05:00
|
|
|
}
|